SubSeven’s Honey Pot Program
2002; Elsevier BV; Volume: 2002; Issue: 7 Linguagem: Inglês
10.1016/s1353-4858(02)07009-5
ISSN1872-9371
AutoresAbiola Abimbola, David Gresty, Qi Shi,
Tópico(s)Artificial Immune Systems Applications
ResumoA serious security threat today are malicious executables, especially new, unseen malicious executables often arriving as email attachments. These new malicious executables are created at the rate of thousands every year1 and pose a serious threat. Current anti-virus systems attempt to detect these new malicious programs with heuristic generated by hand. This approach is costly and often ineffective. In this paper we introduce the Trojan Horse SubSeven, its capabilities and influence over intrusion detection systems. A Honey Pot program is implemented, simulating the SubSeven Server. The Honey Pot Program provides feedback and stores data to and from the SubSeven’s client.
Referência(s)