翻訳と辞書
Words near each other
・ Honeydripper (film)
・ Honeyeater
・ Honeyford
・ Honeygar
・ Honeygold
・ Honeyguide
・ Honeyguide greenbul
・ HoneyHoney
・ Honeyia
・ Honeyland
・ Honeyman
・ Honeyman and Keppie
・ Honeyman Hardware Company Building
・ Honeyman House
・ Honeyman Island
HoneyMonkey
・ Honeymoon
・ Honeymoon (1928 film)
・ Honeymoon (1947 film)
・ Honeymoon (1959 film)
・ Honeymoon (1972 film)
・ Honeymoon (1973 film)
・ Honeymoon (1974 film)
・ Honeymoon (2013 film)
・ Honeymoon (2014 film)
・ Honeymoon (disambiguation)
・ Honeymoon (horse)
・ Honeymoon (Lana Del Rey album)
・ Honeymoon (song)
・ Honeymoon Academy


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

HoneyMonkey : ウィキペディア英語版
HoneyMonkey

HoneyMonkey, short for Strider HoneyMonkey Exploit Detection System, is a Microsoft Research honeypot. The implementation uses a network of computers to crawl the World Wide Web searching for websites that use browser exploits to install malware on the HoneyMonkey computer. A snapshot of the memory, executables and registry of the honeypot computer is recorded before crawling a site. After visiting the site, the state of memory, executables, and registry is recorded and compared to the previous snapshot. The changes are analyzed to determine if the visited site installed any malware onto the client honeypot computer.
HoneyMonkey is based on the honeypot concept, with the difference that it actively seeks websites that try to exploit it. The term was coined by Microsoft Research in 2005. With honeymonkeys it is possible to find open security holes that are not yet publicly known but are exploited by attackers.
==Technology==
A single HoneyMonkey is an automated program that tries to mimic the action of a user surfing the net. A series of HoneyMonkeys are run on virtual machines running Windows XP, at various levels of patching — some are fully patched, some fully vulnerable, and others in between these two extremes. The HoneyMonkey program records every read or write of the file system and registry, thus keeping a log of what data was collected by the web-site and what software was installed by it. Once the program leaves a site, this log is analyzed to determine if any malware has been loaded. In such cases, the log of actions is sent for further manual analysis to an external controller program, which logs the exploit data and restarts the virtual machine to allow it to crawl other sites starting in a known uninfected state.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「HoneyMonkey」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.