2007
DOI: 10.1016/j.diin.2007.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Capture – A behavioral analysis tool for applications and documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0
3

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 1 publication
0
16
0
3
Order By: Relevance
“…1. Capture-HPC honeyclient architecture [8,22] Developments to scale the honeyclient system have been trialed using Grid computing which encapsulated the system for the Grid using the gRAVI toolkit [36] and using workflow engines to control Grid execution [28]. The use of workflow engines proved less effective than hoped at scaling honeyclient infrastructure.…”
Section: Review Of Developments In Active and Passive Sensorsmentioning
confidence: 99%
See 2 more Smart Citations
“…1. Capture-HPC honeyclient architecture [8,22] Developments to scale the honeyclient system have been trialed using Grid computing which encapsulated the system for the Grid using the gRAVI toolkit [36] and using workflow engines to control Grid execution [28]. The use of workflow engines proved less effective than hoped at scaling honeyclient infrastructure.…”
Section: Review Of Developments In Active and Passive Sensorsmentioning
confidence: 99%
“…that captures API calls, shown in Figure 1. The honeyclient system developed incorporates a server component (Capture-HPC) [8] and a Microsoft Windows behavioural analysis tool (Capture-BAT), running in a Virtual Machine environment controlled from the coordinating server. The latest developments have been to provide network API monitoring and extensions to the capture server to incorporate a database and checkpoints to optimize operations [35] and has been used in a variety of studies, including a long term scan of the .nz domain.…”
Section: Review Of Developments In Active and Passive Sensorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Norman Sandbox [18] uses a simulated operating system compatible with Windows for executing malware. Instead of a virtual or emulated machine, a real machine is used for malware execution in Capture [19] and Joebox [20]. Though a real machine takes a long time to refresh its infected OS, it is resistant to the detection of virtual or emulated machines by sophisticated malwares.…”
Section: Related Workmentioning
confidence: 99%
“…However, it does not focus on the network activities of malware and does not contain the second victim so that vulnerability exploitation to other host can not be observed. Instead of using a virtual or emulated machine, a real machine is used for malware execution in Capture [12] and Joebox [16]. These two tools mainly focus on extracting internal behaviour of malware and do not discuss how to securely observe malware's network activities.…”
Section: Related Workmentioning
confidence: 99%