SubSeven’s Honey Pot Program

2002; Elsevier BV; Volume: 2002; Issue: 7 Linguagem: Inglês

10.1016/s1353-4858(02)07009-5

ISSN

1872-9371

Autores

Abiola Abimbola, David Gresty, Qi Shi,

Tópico(s)

Artificial Immune Systems Applications

Resumo

A serious security threat today are malicious executables, especially new, unseen malicious executables often arriving as email attachments. These new malicious executables are created at the rate of thousands every year1 and pose a serious threat. Current anti-virus systems attempt to detect these new malicious programs with heuristic generated by hand. This approach is costly and often ineffective. In this paper we introduce the Trojan Horse SubSeven, its capabilities and influence over intrusion detection systems. A Honey Pot program is implemented, simulating the SubSeven Server. The Honey Pot Program provides feedback and stores data to and from the SubSeven’s client.

Referência(s)
Altmetric
PlumX