Honeynets: an educational resource for IT security
CITC5 '04 Proceedings of the 5th conference on Information technology education
Communications of the ACM - Two decades of the language-action perspective
A Contextual Framework for Combating Identity Theft
IEEE Security and Privacy
Identity theft in the USA: evidence from 2002 to 2006
International Journal of Mobile Communications
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Practical uses of virtual machines for protection of sensitive user data
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
The nepenthes platform: an efficient approach to collect malware
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Hi-index | 0.00 |
Honeynet intruders often use Internet Relay Chat (IRC) to communicate with their peers. When they do, honeynet operators can observe social interactions among black hats, which may disclose their attack and intrusion tactics, describe their motives, or otherwise shed light on their underground activities. In one recent case, honeynet intruders exposed the existence of automated tools that support and facilitate identity theft and credit-card fraud. Members of a community who call themselves carders use these tools to defraud Internet merchants and consumers of potentially large financial sums.