2019 International Carnahan Conference on Security Technology (ICCST) 2019
DOI: 10.1109/ccst.2019.8888409
|View full text |Cite
|
Sign up to set email alerts
|

Malware Capturing and Analysis using Dionaea Honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 4 publications
0
10
0
1
Order By: Relevance
“…Even though high interaction honeypots provide a more realistic environment, thus capturing more data from the attacker, they introduce more risks to the testing environment, as well as require more resources. As such, considering the operational costs for the duration of our experiments, we used the docker images of the following tools for data collection and data analysis, namely: Dionaea [ 29 ]. A low-interaction honeypot, emulates HTTP, FTP, TFTP, SMB, MSSQL and VOIP, with support for TLS and IPv6.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though high interaction honeypots provide a more realistic environment, thus capturing more data from the attacker, they introduce more risks to the testing environment, as well as require more resources. As such, considering the operational costs for the duration of our experiments, we used the docker images of the following tools for data collection and data analysis, namely: Dionaea [ 29 ]. A low-interaction honeypot, emulates HTTP, FTP, TFTP, SMB, MSSQL and VOIP, with support for TLS and IPv6.…”
Section: Methodsmentioning
confidence: 99%
“…Dionaea [ 29 ]. A low-interaction honeypot, emulates HTTP, FTP, TFTP, SMB, MSSQL and VOIP, with support for TLS and IPv6.…”
Section: Methodsmentioning
confidence: 99%
“…Tiny Honeypot [12] is a server-based honeypot, which listens to all Transmission Control Protocol (TCP) ports, logging all interaction activities. Dionaea [13] is written in Python and emulates the MQ Telemetry Transport (MQTT) protocol. Jackpot [12] is related to Simple Mail Transfer Protocol (SMTP) and aims to combat email spam.…”
Section: A Honeypot: a Security Trapmentioning
confidence: 99%
“…In view of their properties and exercises, the malware is grouped. These groupings of malware and their conduct assist analysts with fostering a security system to keep an association from these sorts of destructive and pernicious exercises set off by the malware [26].…”
Section: Crypto-ransomware Approachmentioning
confidence: 99%