Detail výsledku
Buffer Overflow Attacks Data Acquisition
DROZD, M.; BARABAS, M.; GRÉGR, M.; CHMELAŘ, P. Buffer Overflow Attacks Data Acquisition. Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011. p. 775-779. ISBN: 978-1-4577-1423-8.
Typ
článek ve sborníku konference
Jazyk
anglicky
Autoři
Drozd Michal, Ing., UIFS (FIT)
Barabas Maroš, Ing., Ph.D., UITS (FIT)
Grégr Matěj, Ing., Ph.D., CVIS ‒ KolejNet (CIS), UIFS (FIT)
Chmelař Petr, Ing., UIFS (FIT)
Barabas Maroš, Ing., Ph.D., UITS (FIT)
Grégr Matěj, Ing., Ph.D., CVIS ‒ KolejNet (CIS), UIFS (FIT)
Chmelař Petr, Ing., UIFS (FIT)
Abstrakt
This article describes the acquisition of data from buffer overflow attacks from university campus and enterprise network. It provides an overview of the design of system for gathering data, learning and detection of zero day malware using shadow honeypot Argos and low interaction honeypot HoneyD.
Klíčová slova
malware, buffer overflow, network monitoring, honeypot, data acquisition, statistics
Rok
2011
Strany
775–779
Sborník
Proceedings of the 6th IEEE International Conference on IDAACS 2011
Řada
Volume 2
Konference
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
ISBN
978-1-4577-1423-8
Vydavatel
Institute of Electrical and Electronics Engineers
Místo
Praha
BibTeX
@inproceedings{BUT76417,
author="Michal {Drozd} and Maroš {Barabas} and Matěj {Grégr} and Petr {Chmelař}",
title="Buffer Overflow Attacks Data Acquisition",
booktitle="Proceedings of the 6th IEEE International Conference on IDAACS 2011",
year="2011",
series="Volume 2",
pages="775--779",
publisher="Institute of Electrical and Electronics Engineers",
address="Praha",
isbn="978-1-4577-1423-8"
}
Projekty
Automatizované zpracování útoků, MPO, TIP, FR-TI1/037, zahájení: 2009-10-01, ukončení: 2013-09-30, ukončen
Výzkumné skupiny
Výzkumná skupina bezpečnosti informačních technologií (VZ Security@FIT)
Pracoviště