Honey Monkey Network Exploration

A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine Also, the accomplishment of exploits may be detected by t...

Full description

Saved in:
Bibliographic Details
Main Authors BECK DOUGLAS R, WANG YI-MIN
Format Patent
LanguageEnglish
Published 07.10.2010
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited.
Bibliography:Application Number: US20100818038