Recent posts

TypePostAuthorRepliesLast updated
Book pageIDENTIFICATION OF MALICIOUS WEB SERVERS jamie.riden08 years 6 weeks ago
Book pageINTRODUCTION jamie.riden08 years 6 weeks ago
Book pageIntroduction drupal08 years 6 weeks ago
Imagefigure18 jamie.riden08 years 6 weeks ago
Book pageSERVER HONEYPOTS VS. CLIENT HONEYPOTS jamie.riden08 years 6 weeks ago
Imagefigure19 jamie.riden08 years 6 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden08 years 6 weeks ago
Book pageFUTURE WORK jamie.riden08 years 6 weeks ago
Imagefigure17 jamie.riden08 years 6 weeks ago
Imagefigure16 jamie.riden08 years 6 weeks ago
Imagefigure8 jamie.riden08 years 6 weeks ago
Imagefigure7 jamie.riden08 years 6 weeks ago
Imagefigure6 jamie.riden08 years 6 weeks ago
Imagefigure5 jamie.riden08 years 6 weeks ago
Imagefigure4 jamie.riden08 years 6 weeks ago
Imageinput-urls-by-cat jamie.riden08 years 6 weeks ago
Book pageCLIENT-SIDE ATTACKS jamie.riden08 years 6 weeks ago
Imageclient honeypot jamie.riden08 years 6 weeks ago
Imageserver honeypot jamie.riden08 years 6 weeks ago
Book pageINTRODUCTION jamie.riden08 years 6 weeks ago
Book pageAPPENDIX E: Fast-Flux Proxy Samples jamie.riden08 years 6 weeks ago
Book pageAPPENDIX D: Fast-Flux Proxy Samples jamie.riden08 years 6 weeks ago
Book pageAPPENDIX C: Fast-Flux Proxy Samples jamie.riden08 years 6 weeks ago
Book pageAPPENDIX B: The Infection Process jamie.riden08 years 6 weeks ago
Book pageAPPENDIX A: Fast-Flux Proxy Samples jamie.riden08 years 6 weeks ago