03276nam 2200637 450 991082329210332120230725045709.01-306-77960-X3-486-71151-210.1524/9783486711516(CKB)3360000000351772(EBL)1348689(SSID)ssj0001121076(PQKBManifestationID)11633801(PQKBTitleCode)TC0001121076(PQKBWorkID)11160670(PQKB)10319465(MiAaPQ)EBC1348689(DE-B1597)233046(OCoLC)979892041(DE-B1597)9783486711516(Au-PeEL)EBL1348689(CaPaEBR)ebr10883524(CaONFJC)MIL609211(OCoLC)879550638(EXLCZ)99336000000035177220140626h20112011 uy 0engur|n|---|||||txtccrClient-Honeypots exploring malicious websites /Jan Gerrit Göbel, Andreas Dewald ; with a foreword by Prof. Dr. Felix Freiling ; Kathrin Mönch, editorMünchen, Germany :Oldenbourg Verlag München,2011.©20111 online resource (236 p.)Description based upon print version of record.3-486-70526-1 Includes bibliographical references and index.Front Matter -- 1 Introduction -- 2 Honeypot Basics -- 3 An Introduction to Client-Side Exploits -- 4 Protection and Analysis Tools -- 5 A Survey of current Client-Side Honeypots -- 6 Composing a Honeyclient-Framework -- 7 Operating Selected Client-Side Honeypots -- 8 Epilogue -- Back MatterWith the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web browsers, emails with attached files exploit common email applications, and embedded links in instant messenger or Twitter messages lead to malware contaminated sites. This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and their proceeding. Client honeypots are a new technique to study malware that targets user client applications, like web browsers, email clients, or instant messengers. We introduce some of the more well-known client honeypots, how they work, and how they can be used to secure a computer network. Furthermore, the authors show a few of the most frequently used client application exploits and how they can be examined to get more information about the underground economy. Computer networksSecurity measuresComputer networksSecurity measures.005.8ST 277rvkGöbel Jan Gerrit1596974Dewald AndreasFreiling FelixMönch KathrinMiAaPQMiAaPQMiAaPQBOOK9910823292103321Client-Honeypots3918537UNINA