Mladenov et al., 2017 - Google Patents
Repurposing defensive technologies for offensive Red Team operationsMladenov et al., 2017
View PDF- Document ID
- 9212080622384223358
- Author
- Mladenov K
- Zismer A
- Publication year
External Links
Snippet
Performing a successful penetration test highly depends on being stealthy and remaining undetected. While being on assignment, the Red Team performing the test has to avoid triggering traps and getting caught by the Blue Team. In this paper we take a close look at a …
- 230000035515 penetration 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nawrocki et al. | A survey on honeypot software and data analysis | |
WO2019179375A1 (en) | Method and device for defending network attack | |
Žagar et al. | Security aspects in IPv6 networks–implementation and testing | |
Mandal et al. | A survey on network security tools for open source | |
Karthikeyan et al. | Honeypots for network security | |
US10630708B2 (en) | Embedded device and method of processing network communication data | |
Shimanaka et al. | Cyber deception architecture: Covert attack reconnaissance using a safe sdn approach | |
Rahman et al. | Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm | |
Zemene et al. | Implementing high interaction honeypot to study SSH attacks | |
Sharma | Honeypots in Network Security | |
Gehrke | The unexplored impact of ipv6 on intrusion detection systems | |
Mladenov et al. | Repurposing defensive technologies for offensive Red Team operations | |
Melara | Performance analysis of the Linux firewall in a host | |
Amran et al. | An evidential network forensics analysis model with adversarial capability and layering | |
Gallopeni et al. | Botnet command-and-control traffic analysis | |
Goebel | Advanced Honeynet based Intrusion Detection | |
Grant | Distributed detection and response for the mitigation of distributed denial of service attacks | |
Rodrigues et al. | Design and implementation of a low-cost low interaction IDS/IPS system using virtual honeypot approach | |
Kalia et al. | Masking approach to secure systems from operating system fingerprinting | |
CN115225297B (en) | Method and device for blocking network intrusion | |
Zhai et al. | Research on applications of honeypot in Campus Network security | |
Bhuyan et al. | Practical tools for attackers and defenders | |
Pouget et al. | White paper: Honeypot, honeynet: A comparative survey | |
Mohammed et al. | 3 Using Routers and Honeypots in Combination for Collecting | |
Guerra Manzanares | HoneyIo4: the construction of a virtual, low-interaction IoT honeypot |