-
1
-
-
64349088365
-
-
p. available from, accessed on 2 Janurary 2007
-
K. Wang, "Honeyclient," vol. 2007, no. 1/2/2007, 2005, p. available from http://www.honeyclient.org/trac; accessed on 2 Janurary 2007.
-
(2005)
Honeyclient
, vol.2007
, Issue.1-2
-
-
Wang, K.1
-
2
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
San Diego: Internet Society
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King, "Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities," in 13th Annual Network and Distributed System Security Symposium. San Diego: Internet Society, 2006.
-
(2006)
13th Annual Network and Distributed System Security Symposium
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
3
-
-
85077681170
-
A crawlerbased study of spyware on the web
-
San Diego: The Internet Society
-
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy, "A crawlerbased study of spyware on the web," in 13th Annual Network and Distributed System Security Symposium. San Diego: The Internet Society, 2006.
-
(2006)
13th Annual Network and Distributed System Security Symposium
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
4
-
-
34447529849
-
-
pp. available from, accessed on 22 September 2007
-
C. Seifert and R. Steenson, "Capture - honeypot client," 2006, pp. available from https://www.client--honeynet.org/capture.html; accessed on 22 September 2007.
-
(2006)
Capture - honeypot client
-
-
Seifert, C.1
Steenson, R.2
-
6
-
-
58149093741
-
-
Netscape Communications Corporation, p. available from, accessed on 13 October 2007
-
Netscape Communications Corporation, "DMOZ open directory project," 1998, p. available from http://www.dmoz.org; accessed on 13 October 2007.
-
DMOZ open directory project
, pp. 1998
-
-
-
7
-
-
64349098756
-
-
p. available from, accessed on 20 November 2007
-
D. Filo and J. Wang, "Yahoo! search engine," 1994, p. available from http://www.yahoo.com/; accessed on 20 November 2007.
-
(1994)
-
-
Filo, D.1
Wang, J.2
-
9
-
-
64349084540
-
-
p. available from, accessed on 13 September 2008
-
HauteSecure, "Home page," 2006, p. available from http://www.hautesecure.com; accessed on 13 September 2008.
-
Home
, pp. 2006
-
-
-
10
-
-
56749179139
-
Application of divide-andconquer algorithm paradigm to improve the detection speed of high interaction client honeypots
-
Ceara: ACM
-
C. Seifert, P. Komisarczuk, and I. Welch, "Application of divide-andconquer algorithm paradigm to improve the detection speed of high interaction client honeypots," in 23rd Annual ACM Symposium on Applied Computing. Ceara: ACM, 2008.
-
(2008)
23rd Annual ACM Symposium on Applied Computing
-
-
Seifert, C.1
Komisarczuk, P.2
Welch, I.3
-
11
-
-
64349086260
-
-
C. Seifert, Improving detection accuracy and speed with hybrid client honeypots, phd proposal, 2007. Victoria University of Wellington, 2007, pp. available from http://www.mcs.vuw.ac.nz/~cseifert/ publications/Cseifert phd proposal--Hybrid Client Honeypots.pdf; accessed on 22 March 2007.
-
C. Seifert, "Improving detection accuracy and speed with hybrid client honeypots, phd proposal," vol. 2007. Victoria University of Wellington, 2007, pp. available from http://www.mcs.vuw.ac.nz/~cseifert/ publications/Cseifert phd proposal--Hybrid Client Honeypots.pdf; accessed on 22 March 2007.
-
-
-
-
12
-
-
84880116758
-
Honeyc - the low-interaction client honeypot
-
Hamilton
-
C. Seifert, I. Welch, and P. Komisarczuk, "Honeyc - the low-interaction client honeypot," in NZCSRCS, Hamilton, 2007.
-
(2007)
NZCSRCS
-
-
Seifert, C.1
Welch, I.2
Komisarczuk, P.3
-
14
-
-
58149103419
-
Caffeine monkey: Automated collection, detection and analysis of malicious javascript
-
Las Vegas
-
B. Feinstein and D. Peck, "Caffeine monkey: Automated collection, detection and analysis of malicious javascript," in Black Hat USA 2007, Las Vegas, 2007.
-
(2007)
Black Hat USA 2007
-
-
Feinstein, B.1
Peck, D.2
-
15
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
Cambridge: Usenix
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The ghost in the browser: Analysis of web-based malware," in Hot-Bots'07. Cambridge: Usenix, 2007.
-
(2007)
Hot-Bots'07
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
16
-
-
64349108593
-
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, All your iframes point to us. Google Inc., 2008, pp. available from http://googleonlinesecurity.blogspot.com/2008/02/ all-your-iframe-are-point-to- us.html; accessed on 15 Feburary 2008.
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All your iframes point to us." Google Inc., 2008, pp. available from http://googleonlinesecurity.blogspot.com/2008/02/ all-your-iframe-are-point-to- us.html; accessed on 15 Feburary 2008.
-
-
-
-
17
-
-
85076780225
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
Seattle: Usenix
-
C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir, "Browsershield: Vulnerability-driven filtering of dynamic html," in 7th USENIX Symposium on Operating Systems Design and Implementation. Seattle: Usenix, 2006.
-
(2006)
7th USENIX Symposium on Operating Systems Design and Implementation
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
19
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Baltimore: Usenix
-
K. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. Keromytis, "Detecting targeted attacks using shadow honeypots," in 14th USENIX Security Symposium. Baltimore: Usenix, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Anagnostakis, K.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.6
-
20
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
Boston, MA, August
-
A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy, "Spyproxy: Execution-based detection of malicious web content," in Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
21
-
-
33846537555
-
An email worm vaccine architecture
-
Singapore
-
S. Sidiroglou, J. Ioannidis, A. Keromytis, and S. J. Stolfo, "An email worm vaccine architecture," in 1st Information Security Practice and Experience Conference, Singapore, 2005.
-
(2005)
1st Information Security Practice and Experience Conference
-
-
Sidiroglou, S.1
Ioannidis, J.2
Keromytis, A.3
Stolfo, S.J.4
-
22
-
-
64349116334
-
A pointillist approach for comparing honeypots
-
Vienna
-
F. Pouget and T. Holz, "A pointillist approach for comparing honeypots," in DIMVA, Vienna, 2005.
-
(2005)
DIMVA
-
-
Pouget, F.1
Holz, T.2
-
23
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
Singapore: ACM Press
-
S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in 6th ACM Conference on Computer and Communications Security. Singapore: ACM Press, 1999.
-
(1999)
6th ACM Conference on Computer and Communications Security
-
-
Axelsson, S.1
-
24
-
-
64349102183
-
-
Microsoft Cooperation, Microsoft security bulletin ms06-055: Vulnerability in vector markup language could allow remote code execution, 2006, pp. available from http://www.microsoft.com/technet/security/Bulletin/ MS06--055.mspx; accessed on 14 February 2007.
-
Microsoft Cooperation, "Microsoft security bulletin ms06-055: Vulnerability in vector markup language could allow remote code execution," 2006, pp. available from http://www.microsoft.com/technet/security/Bulletin/ MS06--055.mspx; accessed on 14 February 2007.
-
-
-
|