Laboratoire d’Analyse et d’Architecture des Systèmes
A.DESSIATNIKOFF, R.AKROUT, E.ALATA, M.KAANICHE, V.NICOMETTE
TSF
Rapport LAAS N°11053, Février 2011, 12p.
Diffusable
123988A.DESSIATNIKOFF, R.AKROUT, E.ALATA, V.NICOMETTE, M.KAANICHE
TSF
Manifestation avec acte : Computer and Electronics Security Applications Rendez-vous (c&esar 2010), Rennes (France), 22-24 Novembre 2010, pp.116-130 , N° 10446
Diffusable
123173J.ARLAT, E.ALATA, Y.DESWARTE, Y.LAAROUCHI, D.POWELL
TSF
Rapport de Contrat : IMAP. Airbus-SDC, Septembre 2010, 11p. , N° 10505
Non diffusable
122395M.LASTERA, E.ALATA, J.ARLAT, Y.DESWARTE, D.POWELL
TSF
Rapport de Contrat : IMAP. Airbus-SDC, Septembre 2010, 24p. , N° 10506
Non diffusable
122397V.NICOMETTE, M.KAANICHE, E.ALATA
TSF
Revue Scientifique : Techniques et Sciences Informatiques, Vol.29, N°6, pp.691-720, Septembre 2010 , N° 09176
Diffusable
122294E.ABGRALL, R.AKROUT, E.ALATA, A.DESSIATNIKOFF, Y.DESWARTE, S.GOMBAULT, M.KAANICHE, K.KANOUN, I.KEMGOUM, L.LE HENAFF, Y.LE TRAON, R.LUDINARD, T.MOUELHI, V.NICOMETTE, A.RIBAULT, F.SORIN, E.TOTEL, F.TRONEL, H.WAESELYNCK
Kereval, TSF, Telecom Bretagne, SUPELEC Rennes
Rapport de Contrat : ANR. Projet DALI, Août 2010, 17p. , N° 10822
Diffusable
123640S.DONATELLI, E.ALATA, A.BONDAVALLI, M.BECCUTI, D.CEROTTI, S.CHIARADONNA, ADAIDONE, G.DONDOSSOLA, F.DI GIANDOMENICO, G.FRANCESCHINIS, F.GARRONE, O.HAMOUDA, M.KAANICHE, P.LOLLINI, V.NICOMETTE
CNIT, TSF, CNR-ISTI, CESI
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Mai 2009, 89p. , N° 09236
Diffusable
117556G.FRANCESCHINIS, E.ALATA, J.ANTUNES, H.BEITOLLAHI, A.BESSANI, M.CORREIA, W.DANTAS, G.DECONINCK, M.KAANICHE, N.F.NEVES, V.NICOMETTE, P.SOUSA, P.VERISSIMO
TSF, FCUL Portugal, KUL, CNIT
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Mai 2009, 88p. , N° 09237
Diffusable
117558E.ALATA, M.KAANICHE, V.NICOMETTE
TSF
Manifestation avec acte : 3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR/SSI'2008), Loctudy (France), 13-17 Octobre 2008, pp.301-315 , N° 08376
Diffusable
Plus d'informations
E.ALATA, I.ALBERDI, V.NICOMETTE, P.OWEZARSKI, M.KAANICHE
TSF, OLC
Revue Scientifique : Journal in Computer Virology, Vol.4, N°2, pp.127-136, Mai 2008 , N° 08246
Diffusable
Plus d'informations
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations performed by the attackers on the honeypot itself. Outgoing malicious activities carried out from the honeypot towards remote machines on the Internet are generally disallowed for legal liability reasons. It is particularly instructive, however, to observe activities initiated from the honeypot in order to monitor attacker behavior across different, possibly compromised remote machines. This paper proposes to this end a dynamic redirection mechanism of connections initiated from the honeypot. This mechanism gives the attacker the illusion of being actually connected to a remote machine whereas he is redirected to another local honeypot. The originality of the proposed redirection mechanism lies in its dynamic aspect: the redirections are made automatically on the fly. This mechanism has been implemented and tested on a Linux kernel. This paper presents the design and the implementation of this mechanism.