Amun: automatic capturing of malicious software
dc.contributor.author | Göbel, Jan | |
dc.contributor.editor | Freiling, Felix C. | |
dc.date.accessioned | 2019-01-17T13:26:51Z | |
dc.date.available | 2019-01-17T13:26:51Z | |
dc.date.issued | 2010 | |
dc.description.abstract | This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the scriping language Python, a modular design, and the possibility to write vulnerability modules in XML allow the honeypot to be easily maintained and extended to personal needs. | en |
dc.identifier.isbn | 978-3-88579-264-2 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/19780 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-170 | |
dc.title | Amun: automatic capturing of malicious software | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 189 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 177 | |
gi.conference.date | 5.-7. Oktober 2010 | |
gi.conference.location | Berlin | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1