Abiola Abimbola, David Gresty, Qi Shi,
... In this paper we introduce the Trojan Horse SubSeven, its capabilities and influence over intrusion detection systems. A Honey Pot program is implemented, simulating the SubSeven Server. The Honey Pot Program provides feedback and stores data to and from the SubSeven’s client.
Tópico(s): Artificial Immune Systems Applications
2002 - Elsevier BV | Network Security
... and using method of the Trojan horse called SubSeven from the two aspects of server and control ...
Tópico(s): Advanced Malware Detection Techniques
2008 - Elsevier BV | Computers & Security
Muhamad Arif Hashim, Iman Hazwam Abd Halim, Mohammad Hafiz Ismail, Norfaizalfarid Mohd Noor, Mohd Faris Mohd Fuzi, Abdul Hapes Mohammed, Ray Adderley JM Gining,
... to investigate other Trojan attacks such as Zeus, SubSeven or Back Orifice by using the same digital ...
Tópico(s): Digital Media Forensic Detection
2017 - | Journal of Computing Research and Innovation