{"title":"自动状态机在客户端蜜罐中的应用","authors":"Yaser Alosefer, O. Rana","doi":"10.1109/FUTURETECH.2010.5482695","DOIUrl":null,"url":null,"abstract":"Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform for integrating client honeypots applied on state machines in a Windows environment.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Automated State Machines Applied in Client Honeypots\",\"authors\":\"Yaser Alosefer, O. Rana\",\"doi\":\"10.1109/FUTURETECH.2010.5482695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform for integrating client honeypots applied on state machines in a Windows environment.\",\"PeriodicalId\":380192,\"journal\":{\"name\":\"2010 5th International Conference on Future Information Technology\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 5th International Conference on Future Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FUTURETECH.2010.5482695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Conference on Future Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUTURETECH.2010.5482695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automated State Machines Applied in Client Honeypots
Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform for integrating client honeypots applied on state machines in a Windows environment.