Network Malware Activity - A View from Honeypot Systems

@inproceedings{Skrzewski2012NetworkMA,
  title={Network Malware Activity - A View from Honeypot Systems},
  author={Miroslaw Skrzewski},
  booktitle={CN},
  year={2012}
}
There is little detailed information about the lifetime of network malware and malware infected systems. There is a lot of information about the emergence of some new versions of malware, used security vulnerabilities, methods and the range of infection but they are generally related to the start of life cycle of malware. Much less information is available about what happens next – how long the malware actively is distributed on the network, how long operate infected hosts and how the amount of… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-3 OF 3 CITATIONS

Lessons learned from correlation of honeypots' data and spatial data

  • 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND