eldorado.tu-dortmund.de/server/api/core/bitstreams/2b8286e5-419a-4f63-affd-9e818b38621a/content
occurrence.
4 Details
4.1 Malware Collector For collecting malware, server-honeypots like Nepenthes [8] and Amun [9], which pro- vide vulnerable services in order to attract spreading malware, are used in [...] the benign traces, respectively, the hyperplane found by a SVM can be taken as a signature.
4 DETAILS 8
Optimization. The clustering as well as the signature creation can be time consuming and thus, for the [...] Workshop: Network Attack Detection and Defense, volume 08102 of Dagstuhl Seminar Proceedings, 2008.
[8] P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling. The Nepenthes platform: An efficient …