Nothing Special   »   [go: up one dir, main page]

Mladenov et al., 2017 - Google Patents

Repurposing defensive technologies for offensive Red Team operations

Mladenov et al., 2017

View PDF
Document ID
9212080622384223358
Author
Mladenov K
Zismer A
Publication year

External Links

Snippet

Performing a successful penetration test highly depends on being stealthy and remaining undetected. While being on assignment, the Red Team performing the test has to avoid triggering traps and getting caught by the Blue Team. In this paper we take a close look at a …
Continue reading at rp.os3.nl (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Similar Documents

Publication Publication Date Title
Nawrocki et al. A survey on honeypot software and data analysis
WO2019179375A1 (en) Method and device for defending network attack
Žagar et al. Security aspects in IPv6 networks–implementation and testing
Mandal et al. A survey on network security tools for open source
Karthikeyan et al. Honeypots for network security
US10630708B2 (en) Embedded device and method of processing network communication data
Shimanaka et al. Cyber deception architecture: Covert attack reconnaissance using a safe sdn approach
Rahman et al. Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm
Zemene et al. Implementing high interaction honeypot to study SSH attacks
Sharma Honeypots in Network Security
Gehrke The unexplored impact of ipv6 on intrusion detection systems
Mladenov et al. Repurposing defensive technologies for offensive Red Team operations
Melara Performance analysis of the Linux firewall in a host
Amran et al. An evidential network forensics analysis model with adversarial capability and layering
Gallopeni et al. Botnet command-and-control traffic analysis
Goebel Advanced Honeynet based Intrusion Detection
Grant Distributed detection and response for the mitigation of distributed denial of service attacks
Rodrigues et al. Design and implementation of a low-cost low interaction IDS/IPS system using virtual honeypot approach
Kalia et al. Masking approach to secure systems from operating system fingerprinting
CN115225297B (en) Method and device for blocking network intrusion
Zhai et al. Research on applications of honeypot in Campus Network security
Bhuyan et al. Practical tools for attackers and defenders
Pouget et al. White paper: Honeypot, honeynet: A comparative survey
Mohammed et al. 3 Using Routers and Honeypots in Combination for Collecting
Guerra Manzanares HoneyIo4: the construction of a virtual, low-interaction IoT honeypot