KYE/KYT Papers
Know Your Enemy: Analysis of 24 Hours Internet Attacks
Abstract For the past decades, bots and botnets have been on the front page of newspapers and are one of ...
Read More
Read More
Know Your Enemy: The Social Dynamics of Hacking
Abstract Though most information security research focuses on current threats, tools, and techniques to defeat attacks, it is vital to ...
Read More
Read More
Know Your Tools: Qebek – Conceal the Monitoring
Abstract For the last few years, while low-interaction (LI) honeypot systems like Nepenthes and PHoneyC are getting more and more ...
Read More
Read More
Know Your Enemy: Containing Conficker
Abstract The Conficker worm has infected several million computers since it first started spreading in late 2008 but attempts to ...
Read More
Read More
Know Your Enemy Lite: Proxy Threats – Socks v666
Introduction A common assumption within the network and security community is that Network Address Translation (NAT) and filtering devices such ...
Read More
Read More
Know Your Enemy: Malicious Web Servers
Introduction Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to ...
Read More
Read More
Whitepapers
Glastopf – A dynamic, low-interaction web application honeypot
Abstract Currently, attacks against web applications make up more than 60% of the total number of attempted attacks on the ...
Read More
Read More