2008 Seventh European Dependable Computing Conference 2008
DOI: 10.1109/edcc-7.2008.15
|View full text |Cite
|
Sign up to set email alerts
|

SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models

Abstract: The dependability community has expressed a growing interest in the recent years for the effects of malicious, external, operational faults in computing systems, ie. intrusions. The term intrusion tolerance has been introduced to emphasize the need to go beyond what classical fault tolerant systems were able to offer. Unfortunately, as opposed to well understood accidental faults, the domain is still lacking sound data sets and models to offer rationales in the design of intrusion tolerant solutions. In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 15 publications
0
24
0
Order By: Relevance
“…The analyzed dataset is composed of 1599 malware samples collected by a real world honeypot deployment, SGNET [7], [8]. SGNET is a distributed honeypot deployment for the observation of server-side code injection attacks.…”
Section: Experimental Setup and Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The analyzed dataset is composed of 1599 malware samples collected by a real world honeypot deployment, SGNET [7], [8]. SGNET is a distributed honeypot deployment for the observation of server-side code injection attacks.…”
Section: Experimental Setup and Architecturementioning
confidence: 99%
“…This is achieved by taking into consideration real-world data generated by a distributed honeypot deployment, SGNET [7], [8]. The advantages of this dataset over those used in the previous work [4] can be summarized as follows:…”
Section: Introductionmentioning
confidence: 99%
“…These networks, also called honeynets, can be deployed on a few IP addresses within a local network. The project Leurre.com [7], SGNET [8], [9] and the honeynet initiative from CAIDA [10] are examples of distributed honeypot networks in different locations.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, we experiment with a protocol-agnostic technique [20] previously adopted to model the attack traffic in high-interaction honeypots [18,16]. The idea consists in building a finite state machine (FSM) of the network activity generated by each malware sample.…”
Section: Introductionmentioning
confidence: 99%