Code of conduct
Know Your Enemy: Analysis of 24 Hours Internet Attacks
Abstract For the past decades, bots and botnets have been on the front page of newspapers and are one of ...
Know Your Enemy: The Social Dynamics of Hacking
Abstract Though most information security research focuses on current threats, tools, and techniques to defeat attacks, it is vital to ...
Know Your Tools: Qebek – Conceal the Monitoring
Abstract For the last few years, while low-interaction (LI) honeypot systems like Nepenthes and PHoneyC are getting more and more ...
Know Your Enemy: Containing Conficker
Abstract The Conficker worm has infected several million computers since it first started spreading in late 2008 but attempts to ...
Know Your Enemy Lite: Proxy Threats – Socks v666
Introduction A common assumption within the network and security community is that Network Address Translation (NAT) and filtering devices such ...
Know Your Enemy: Malicious Web Servers
Introduction Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to ...
Glastopf – A dynamic, low-interaction web application honeypot
Abstract Currently, attacks against web applications make up more than 60% of the total number of attempted attacks on the ...