Honeynet para el análisis del tráfico y muestras de malware

Article Spanish; Castilian OPEN
Diego de Diego, Santiago; Romero López, Gustavo;
(2017)
  • Publisher: Universidad de Granada. Departamento de Arquitectura y Tecnología de Computadores
  • Subject: Análisis del tráfico | Security | Malware | Seguridad | Honeynet | Traffic analysis | Honeypots

En este proyecto nos hemos propuesto desplegar varios honeypots en dos dispositivos del tipo Raspberry Pi a fin de analizar ataques dirigidos a la red de la UGR. Presentamos a continuación un breve resumen del experimento. Por un lado hemos obtenido resultados de un hon... View more
  • References (9)

    [1] “The honeynet project,”http://www.honeynet.org/project,accessed:2017- 05-24.

    [2] S.Almotairi, A.Clark, G.Mohay, and J.Zimmermann,“Characterization of attackers' activities in honeypot traffic using principal component analysis,” in Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on. IEEE, 2008, pp. 147-154.

    [3] --, “A technique for detecting new attacks in low-interaction honeypot traffic,” in Internet Monitoring and Protection, 2009. ICIMP'09. Fourth International Conference on. IEEE, 2009, pp. 7-13.

    [4] G. Salles-Loustau, R. Berthier, E. Collange, B. Sobesto, and M. Cukier, “Characterizing attackers and attacks: An empirical study,” in Dependable Computing (PRDC), 2011 IEEE 17th Pacific Rim International Symposium on. IEEE, 2011, pp. 174-183.

    [5] K. Kendall and C. McMillan, “Practical malware analysis,” in Black Hat Conference, USA, 2007, p. 10.

    [6] D. A. Quist and L. M. Liebrock, “Visualizing compiled executables for malware analysis,” in Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009, pp. 27-32.

    [7] R. Harwood and M. Serrano, “Lecture 26: Obfuscation,” 2013, car- negie Mellon University, https://www.cs.cmu.edu/∼fp/courses/15411-f13/ lectures/26- obfuscation.pdf.

    [8] “Shodan is the world's first search engine for internet-connected devices,” https://www.shodan.io, accessed: 2017-05-25. -

    [9] H.project,KnowYourEnemy:LearningAboutSecurityThreats. Addison Wesley, 2004.

  • Similar Research Results (1)
  • Metrics
Share - Bookmark