[PDF][PDF] Models and measures for correlation in cyber-insurance.

R Böhme, G Kataria - Weis, 2006 - core.ac.uk
High correlation in failure of information systems due to worms and viruses has been cited
as major impediment to cyber-insurance. However, of the many cyber-risk classes that …

Lessons learned from the deployment of a high-interaction honeypot

E Alata, V Nicomette, M Kaâniche… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
This paper presents an experimental study and the lessons learned from the observation of
the attackers when logged on a compromised machine. The results are based on a six …

Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots

C Leita, M Dacier, F Massicotte - … , September 20-22, 2006 Proceedings 9, 2006 - Springer
Spitzner proposed to classify honeypots into low, medium and high interaction ones. Several
instances of low interaction exist, such as honeyd, as well as high interaction, such as GenII …

Collection and analysis of attack data based on honeypots deployed on the Internet

E Alata, M Dacier, Y Deswarte, M Kaaâniche… - Quality of Protection …, 2006 - Springer
Abstract The CADHo project (Collection and Analysis of Data from Honeypots) is an ongoing
research action funded by the French ACI “Securiteé & Informatique”[1]. It aims at building …

[PDF][PDF] Alert classification to reduce false positives in intrusion detection

T Pietraszek - 2006 - Citeseer
Wespi. Without your help this thesis would not have gotten to this stage. Clearly, I am solely
responsible for any mistakes that had remained in the report. Last but not least, I am deeply …

Fast and evasive attacks: Highlighting the challenges ahead

MA Rajab, F Monrose, A Terzis - … , September 20-22, 2006 Proceedings 9, 2006 - Springer
Passive network monitors, known as telescopes or darknets, have been invaluable in
detecting and characterizing malware outbreaks. However, as the use of such monitors …

[PDF][PDF] Internet attack knowledge discovery via clusters and cliques of attack traces

F Pouget, M Dacier, J Zimmennan… - Journal of Information …, 2006 - softcomputing.net
There is an increasing awareness of the growing influence of organized entities involved in
today's Internet attacks. However, there is no easy way to discriminate between the …

[图书][B] Mitigating denial of service attacks in computer networks

J Mölsä - 2006 - aaltodoc.aalto.fi
This dissertation studies how to defend against denial of service (DoS) attacks in computer
networks. As it is not possible to prevent these attacks, one must concentrate on mitigating …

[PDF][PDF] A closer look at attack clustering

R Böhme, G Kataria - Proceedings of the I3P Workshop on the Economics …, 2006 - Citeseer
Worms cause correlated failure of many systems in a short span of time. Therefore,
automated defensive approaches have been proposed to counter growth of worms …

[PDF][PDF] Wombat: towards a worldwide observatory of Malicious behaviors and attack threats

F Pouget - 2006 - pdfs.semanticscholar.org
WOMBAT: towards a Worldwide Observatory of Malicious Behaviors and Attack Threats Page
1 TF-CSIRT 2006 WOMBAT: towards a Worldwide Observatory of Malicious Behaviors and …