Placing a low-interaction honeypot in-the-wild: A review of mwcollectd
2010; Elsevier BV; Volume: 2010; Issue: 3 Linguagem: Inglês
10.1016/s1353-4858(10)70034-9
ISSN1872-9371
Autores Tópico(s)Internet Traffic Analysis and Secure E-voting
ResumoWith more than 30 000 new malware threats being detected each day the threat of digital pollution continues to grow at pace. In this rapidly evolving climate, the ability to collect samples of malware which are spreading in-the-wild is a must for many different types of organisations, all of which have different aims. For example, at Kaspersky Lab we create signatures from these malware binaries and use them to maintain the protection of the 250 million users of our products around the world. Meanwhile, several non-profit organisations analyse such binaries to identify command and control servers of botnets and monitor them.
Referência(s)