Honey Monkey Network Exploration
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine Also, the accomplishment of exploits may be detected by t...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
07.10.2010
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited. |
---|---|
Bibliography: | Application Number: US20100818038 |