Placing a low-interaction honeypot in-the-wild: A review of mwcollectd

2010; Elsevier BV; Volume: 2010; Issue: 3 Linguagem: Inglês

10.1016/s1353-4858(10)70034-9

ISSN

1872-9371

Autores

Georg Wicherski,

Tópico(s)

Internet Traffic Analysis and Secure E-voting

Resumo

With more than 30 000 new malware threats being detected each day the threat of digital pollution continues to grow at pace. In this rapidly evolving climate, the ability to collect samples of malware which are spreading in-the-wild is a must for many different types of organisations, all of which have different aims. For example, at Kaspersky Lab we create signatures from these malware binaries and use them to maintain the protection of the 250 million users of our products around the world. Meanwhile, several non-profit organisations analyse such binaries to identify command and control servers of botnets and monitor them.

Referência(s)
Altmetric
PlumX