KYE/KYT Papers

Know Your Enemy: Analysis of 24 Hours Internet Attacks

Abstract For the past decades, bots and botnets have been on the front page of newspapers and are one of ...
Read More

Know Your Enemy: The Social Dynamics of Hacking

Abstract Though most information security research focuses on current threats, tools, and techniques to defeat attacks, it is vital to ...
Read More

Know Your Tools: Qebek – Conceal the Monitoring

Abstract For the last few years, while low-interaction (LI) honeypot systems like Nepenthes and PHoneyC are getting more and more ...
Read More

Know Your Enemy: Containing Conficker

Abstract The Conficker worm has infected several million computers since it first started spreading in late 2008 but attempts to ...
Read More

Know Your Enemy Lite: Proxy Threats – Socks v666

Introduction A common assumption within the network and security community is that Network Address Translation (NAT) and filtering devices such ...
Read More

Know Your Enemy: Malicious Web Servers

Introduction Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to ...
Read More


Glastopf – A dynamic, low-interaction web application honeypot

Abstract Currently, attacks against web applications make up more than 60% of the total number of attempted attacks on the ...
Read More