Back to Results
First PageMeta Content
Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing


Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo
Add to Reading List

Document Date: 2012-03-22 09:28:01


Open Document

File Size: 611,90 KB

Share Result on Facebook

City

Emulation / /

Company

European National Research Networks / Microsoft Corp. / ShixxNOTE 6.net / /

Continent

Europe / /

Country

Singapore / Greece / /

/

Facility

port As / Institute of Computer Science / University of Crete / /

IndustryTerm

passive network / real production systems / real Internet / attacked services / well known vulnerable services / educational networks / database server / web servers / server applications / web server / media players / attack detection technology / vulnerable services / Internet-connected systems / Internet intrusions / /

OperatingSystem

Windows XP / Microsoft Windows / /

Organization

Foundation for Research & Technology / Institute of Computer Science / Institute for Infocomm Research / University of Crete / Windows Internet Naming Service / /

Person

Michalis Polychronakis / Evangelos Markatos / /

/

Position

messenger / /

ProgrammingLanguage

SQL / Microsoft SQL Server / /

Technology

alpha / php / P2P / Plug and Play / naively applied encryption / encryption / attack detection technology / file sharing / HTTP / web server / /

URL

6.net / http /

SocialTag