Back to Results
First PageMeta Content
Computing / Honeypot / Client honeypot / Botnet / Exploit / Denial-of-service attack / Vulnerability / Computer insecurity / Malware / Computer network security / Cyberwarfare / Computer security


The Impact of Honeynets for CSIRTs Jan Kohlrausch and Jochen Schönfelder DFN-CERT Services GmbH Heidenkampsweg 41 DHamburg [kohlrausch|schoenfelder]@dfn-cert.de
Add to Reading List

Document Date: 2007-05-06 13:18:12


Open Document

File Size: 49,16 KB

Share Result on Facebook

City

Baltimore / Amsterdam / Honeypot / Hamburg / /

Company

The eCSIRT.net / Jochen Schönfelder DFN-CERT Services GmbH / Microsoft / /

Country

United States / /

Facility

GRE tunnel / /

IndustryTerm

internet access / high-speed internet access / alerting services / self-spreading internet-worms / advisory and alerting services / arbitrary networks / consequence home-user systems / home banking applications / bank account data / widespread network / large networks / projects deploying network / software updates / public web-server / bot software / containment systems / art infrastructure / vulnerable network services / sensor networks / home-user systems / large network / discussed services / trojan software / internet worms / honey@home systems / internet browsers / software update / european csirt network / vulnerable services / automated attack tools / pilot honeypot infrastructure / vulnerable systems / attack tool / basic services / Internet Explorer / distributed security monitoring systems / /

OperatingSystem

UNIX / Linux / Microsoft Windows / /

Organization

European Union / /

Person

How / Jan Kohlrausch / /

ProgrammingLanguage

XML / /

Technology

virtual machine / XML / IRC protocol / relational database / UNIX / Linux / high-speed internet access / clustering algorithm / operating system / operating systems / AusCERT Asia Pacific Information technology / TCP/IP / automatic identification / HTTP / ISP / simulation / /

URL

http /

SocialTag