In this year, we plan to add more members and contributors. These members come from different universities, organizations or information security researcher.
The following activities are made by our chapter:
Basically, The TWMAN is an automated behavioral malware analysis environment to analyze the malware targeted at Microsoft Windows, and it can develop a free and open source software, and the environment is built around Joe Stewart's TRUMAN sandnet. Although, there are many services of analysis malware behavioral, such as the Norman Sandbox, CWSandbox, Threat Expert, etc. For privacy and policy reasons, it must be treated as if they contain personally identifiable information.
鑑識分析挑戰4-網路電話(由來自澳大利亞團隊的Ben Reardon和來自挪威團隊的 Sjur Eivind Usken提供)將帶您進入Internet上的語音通訊世界。會話發起協定(SIP)已被成功應用在網路電話(VoIP)中，並逐漸成為網路語音通訊的發展主流，當這項技術被廣泛普遍應用的同時，也給了惡意團隊強烈的動機去控制VoIP系統，進行惡意的犯罪活動。因此，這次的鑑識分析挑戰設計了一系列問題，探討SIP與RTP協議，以及所衍生的資訊安全攻擊事件。
Taiwan Honeynet Chapter founded in November 2008. Four staff from NCHC, National Center for High-performance Computing, are responsible for Taiwan Honeynet Chapter so far. Another two full-time staff will join the working group contributed to honeynet development and botnet research on March 2009. Until now, we don't have any full member of the Honeynet Project. Below we diagramed our organization.
The Honeynet Project is a leading international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security. With Chapters around the world, our volunteers have contributed to fight again malware (such as Confickr), discovering new attacks and creating security tools used by businesses and government agencies all over the world.