Detail výsledku

Buffer Overflow Attacks Data Acquisition

DROZD, M.; BARABAS, M.; GRÉGR, M.; CHMELAŘ, P. Buffer Overflow Attacks Data Acquisition. Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011. p. 775-779. ISBN: 978-1-4577-1423-8.
Typ
článek ve sborníku konference
Jazyk
anglicky
Autoři
Drozd Michal, Ing., UIFS (FIT)
Barabas Maroš, Ing., Ph.D., UITS (FIT)
Grégr Matěj, Ing., Ph.D., CVIS ‒ KolejNet (CIS), UIFS (FIT)
Chmelař Petr, Ing., UIFS (FIT)
Abstrakt

This article describes the acquisition of data from buffer overflow attacks from university campus and enterprise network. It provides an overview of the design of system for gathering data, learning and detection of zero day malware using shadow honeypot Argos and low interaction honeypot HoneyD.

Klíčová slova

malware, buffer overflow, network monitoring, honeypot, data acquisition, statistics

Rok
2011
Strany
775–779
Sborník
Proceedings of the 6th IEEE International Conference on IDAACS 2011
Řada
Volume 2
Konference
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
ISBN
978-1-4577-1423-8
Vydavatel
Institute of Electrical and Electronics Engineers
Místo
Praha
BibTeX
@inproceedings{BUT76417,
  author="Michal {Drozd} and Maroš {Barabas} and Matěj {Grégr} and Petr {Chmelař}",
  title="Buffer Overflow Attacks Data Acquisition",
  booktitle="Proceedings of the 6th IEEE International Conference on IDAACS 2011",
  year="2011",
  series="Volume 2",
  pages="775--779",
  publisher="Institute of Electrical and Electronics Engineers",
  address="Praha",
  isbn="978-1-4577-1423-8"
}
Projekty
Automatizované zpracování útoků, MPO, TIP, FR-TI1/037, zahájení: 2009-10-01, ukončení: 2013-09-30, ukončen
Výzkumné skupiny
Pracoviště
Nahoru