Veröffentlichungen

The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security

2014 - Apostolis Zarras

48th IEEE International Carnahan Conference on Security Technology (ICCST), Rome, Italy, October 2014 [PDF]

Verfolgen und Abschwächen von Malicious Remote Control Networks

2010 - Thorsten Holz

Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]

Tracking and Mitigation of Malicious Remote Control Networks

2009 - Thorsten Holz

Universität Mannheim, pages 1-138, URN urn:nbn:de:bsz:180-madoc-23306, April 2009 [MADOC Link] [Persistent ID]

Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients

2008 - Ali Ikinci, Thorsten Holz, Felix Freiling

GI Si­cher­heit - Schutz und Zu­ver­läs­sig­keit, Jah­res­ta­gung des Fach­be­reichs Si­cher­heit der Ge­sell­schaft für In­for­ma­tik, Saarbrücken, April 2008 - **Best Paper Award** [pdf]

Collecting Autonomous Spreading Malware Using High-Interaction Honeypots

2007 - Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou

International Conference on Information and Communications Security (ICICS), LNCS 4861, Zhengzhou, China, December 2007 [pdf]

Virtual Honeypots - From Botnet Tracking to Intrusion Detection

2007 - Niels Provos, Thorsten Holz

Addison-Wesley Professional; 1. edition, 440 pages [Link]

Measurement and Analysis of Autonomous Spreading Malware in a University Environment

2007 - Thorsten Holz, Jan Goebel, Carsten Willems

Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Lucerne, Switzerland, July 2007 [PDF]

Advanced Honeypot-based Intrusion Detection

2006 - Jan Göbel, Jens Hektor, Thorsten Holz

USE­NIX ;login:, Vo­lu­me 31, Issue 6, Pages 18-23, De­cem­ber 2006 [Link] [pdf]

Design and Implementation of the Honey-DVD

2006 - Maximillian Dornseif, Felix Freiling, Nils Gedicke, Thorsten Holz

IEEE In­for­ma­ti­on As­suran­ce Work­shop (IAW), West Point, NY, June 2006 [pdf]

Effektives Sammeln von Malware mit Honeypots

2006 - Thorsten Holz, Georg Wicherski

DFN-CERT Workshop "Sicherheit in vernetzten Systemen", Hamburg, March 2006 [pdf]
Seite: