Related web sites
Results of the WOMBAT project have led to the creation or the enrichment of a number of various web services that will remain maintained by partners in the future. We list them here and we welcome you to pay them a visit. They all have something unique to offer that could benefit from.
Web sites | Description |
---|---|
ANUBIS | Anubis is a service for analyzing malware. Anubis provides an analysis report telling you what it does. If a suspicious URL is submitted, Anubis generates a report that shows you all the activities of the Internet Explorer process when visiting this URL. |
ARGOS | Argos is a full and secure system emulator designed for use in honeypots. Argos extends the popular Qemu to enable it to detect remote attempts to compromise the emulated guest operating system. Using dynamic taint analysis it tracks network data throughtout execution and detects any attempts to use them in an illegal way. When an attack is detected the memory footprint of the attack is logged |
EXPOSURE | EXPOSURE is a service that identifies domain names that are involved in malicious activity by performing large-scale passive DNS analysis. EXPOSURE reports the malicious domain names on a daily basis. |
FIRE | FIRE is a service to identify rogue networks and Internet Service Providers. On a daily basis, reports are generated on this site that expose the dark side of the Internet. |
Honey At Home | Honey At Home is the "@home" implementation of the NoAH project, aiming to facilitate the gathering of information on cyber-attacks. This web site allows users to register with the honey@home service and download the latest version of the software. They can also view certain information regarding the latest attacks received by their sensor. |
Honeyspider | The HoneySpider Network Project is a joint venture between NASK/CERT Polska, GOVCERT.NL and SURFnet. The goal is to develop a client honeypot system, based on existing state-of- the-art client honeypot solutions and a novel crawler application specially tailored for the bulk processing of URLs. This system focuses primarily on attacks against, or involving the use of, Web browsers. |
SHELIA | Shelia is an intrusion detection system for the client side. It comes with a client emulator that scans through a mail folder specified on the command line. Typically, this would be the spam folder. In this folder the client emulator is capable of following every url and opening every attachment. |
SysSec | Capitalizing, in part, on their expertise gained in the WOMBAT project, several of the partners have taken a lead to create SysSec: a European Network of Excellence in the area of Emerging Risks and Vulnerabilities for the Future Internet. Funded, in part, by the European Commission, SysSec has already started to mobilize the Systems Security community in Europe and to create a research roadmap in the area of Systems Security. |
Virustotal | Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. |
WINE | Symantec¹s Worldwide Intelligence Network Environment (WINE) is a platform for repeatable experimental research, which provides researchers access to sampled security-related data feeds that are used internally at Symantec Research Labs. WINE allows researchers to define reference data sets, for validating new algorithms or for conducting empirical studies, and to establish whether the data set is representative for the current landscape of cyber threats. The platform also enables the reproduction of experimental results and allows comparing the performance of different algorithms against the reference data sets. |
WAPI | WAPI, or WOMBAT API, is a SOAP-based API built in the context of the WOMBAT project to facilitate the remote access and exploration of security-related datasets. |