Logo des Repositoriums
 

Amun: automatic capturing of malicious software

dc.contributor.authorGöbel, Jan
dc.contributor.editorFreiling, Felix C.
dc.date.accessioned2019-01-17T13:26:51Z
dc.date.available2019-01-17T13:26:51Z
dc.date.issued2010
dc.description.abstractThis paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the scriping language Python, a modular design, and the possibility to write vulnerability modules in XML allow the honeypot to be easily maintained and extended to personal needs.en
dc.identifier.isbn978-3-88579-264-2
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/19780
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-170
dc.titleAmun: automatic capturing of malicious softwareen
dc.typeText/Conference Paper
gi.citation.endPage189
gi.citation.publisherPlaceBonn
gi.citation.startPage177
gi.conference.date5.-7. Oktober 2010
gi.conference.locationBerlin
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
177.pdf
Größe:
181.24 KB
Format:
Adobe Portable Document Format