Dataset Viewer
Auto-converted to Parquet Duplicate
type
stringclasses
1 value
custom_template
null
created_at
stringlengths
24
24
id
stringlengths
24
24
slug
stringlengths
2
124
featured
int64
0
1
updated_at
stringlengths
24
24
visibility
stringclasses
1 value
status
stringclasses
2 values
feature_image
stringclasses
7 values
published_at
stringlengths
24
24
title
stringlengths
2
127
html
stringlengths
4
358k
plaintext
stringlengths
1
82.3k
mobiledoc
stringlengths
99
369k
comment_id
stringlengths
1
24
post
null
2019-01-31T02:39:49.000Z
63873b9a8b1c1e0007f52ee3
v2-demo-post
0
2019-02-15T07:20:06.000Z
public
draft
null
2019-01-31T02:39:49.000Z
Koenig Demo Post
<p>Hey there! Welcome to the new Ghost editor - affectionately known as <strong>Koenig</strong>.</p><p>Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, ...
Hey there! Welcome to the new Ghost editor - affectionately known as Koenig. Koenig is a brand new writing experience within Ghost, and follows more of a rich writing experience which you've come to expect from the best publishing platforms. Don't worry though! You can still use Markdown too, if that's what you prefer...
{"version":"0.3.1","atoms":[],"cards":[["hr",{}],["embed",{"url":"https://twitter.com/TryGhost/status/761119175192420352","html":"<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">Fun announcement coming this afternoon ? what could it be?</p>&mdash; Ghost (@TryGhost) <a href=\"https://twitter.com/TryGhost/...
5c525ff5e604c8004fbbd5dd
post
null
2016-09-02T03:46:03.000Z
63873b9a8b1c1e0007f52ee4
conficker-domain-abuse
0
2018-10-06T08:54:04.000Z
public
published
null
2016-09-02T08:28:38.000Z
Conficker域名被滥用情况分析
<!--kg-card-begin: markdown--><p>根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。</p> <p>由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。</p> <h2 id="conficker">Conficker域名现状及被滥用状况</h2> <h3 id="conficker">Conficker简介</h3> <p>Conficker是出现于2008年11...
根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。 由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。 Conficker域名现状及被滥用状况 Conficker简介 Conficker是出现于2008年11月,曾感染了数百万台电脑。Conficker有一个独特的特性是它使用了DGA技术。利用随机生成的域名来防止网络设备的封堵。自此以后DGA技术也开始逐渐流行起来。关于con...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"根据对conficker域名的跟踪,我们发现conficker的域名存在明显的滥用。主要表现为浏览器访问conficker域名后,会跳转到广告页面(既有正常业务,也有赌博/色情等灰色业务),有时候还会存在一些垃圾软件(比如虚假的杀毒软件)的推广等。\n\n由于conficker的DGA域名的巨大数量,我们希望了解产生这种状况的原因以及其现在的规模。\n\n##Conficker域名现状及被滥用状况\n\n###Conficker...
8
post
null
2016-09-02T03:50:47.000Z
63873b9a8b1c1e0007f52ee5
cldap-is-now-the-3rd-reflection-amplified-ddos-attack-vector-surpassing-ssdp-and-chargen-en
0
2021-05-08T05:10:18.000Z
public
published
null
2017-11-01T10:14:35.000Z
CLDAP is Now the No.3 Reflection Amplified DDoS Attack Vector, Surpassing SSDP and CharGen
<!--kg-card-begin: markdown--><p>Author: Xu Yang,kenshin</p> <p>With our <a href="https://ddosmon.net/">DDoSMon</a>, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection...
Author: Xu Yang,kenshin With our DDoSMon, we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have been the most frequently abused services in DDoS reflection amplification attacks. They rank respectively 1st, 2nd, 3rd and 4th in th...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Author: Xu Yang,kenshin\n\n\nWith our [DDoSMon](https://ddosmon.net/), we are able to perform continuous and near real-time monitoring on global DDoS attacks. For quite a long time, DNS, NTP, CharGen and SSDP have b...
12
post
null
2016-09-02T06:44:58.000Z
63873b9a8b1c1e0007f52ee6
new-elknot-billgates-variant-with-xor-like-c2-configuration-encryption-scheme
0
2018-10-06T08:53:33.000Z
public
published
null
2016-09-02T07:46:45.000Z
New Elknot/Billgates Variant with XOR like C2 Configuration Encryption Scheme
<!--kg-card-begin: markdown--><h1 id="overview">Overview</h1> <p>Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms <a href="https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf">[1]</a> <a href="http://blog.malwaremustdie.org/20...
Overview Elknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [1] [2] [3] [4]. Multiple variants have been found since its first appearance, while the most infamous variant is called BillGates by many researchers because of its characteristic use of Bill and Gates modules [5]. Besid...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"#Overview\nElknot is a notorious DDoS botnet family which runs on both Linux and Windows platforms [[1]](https://www.botconf.eu/wp-content/uploads/2014/12/2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf) [[2...
16
post
null
2016-10-09T02:39:13.000Z
63873b9a8b1c1e0007f52ee7
invalid-rdata-in-dns
0
2018-10-06T08:54:59.000Z
public
published
null
2016-10-09T03:08:28.000Z
DNS中的“无效Rdata”
<!--kg-card-begin: markdown--><p>所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。</p> <p>在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。</p> <p>另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。</p> <p>尽管还有很多其他...
所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。 在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。 另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,它们降低了这些威胁情报的质量。因此对这些无效rdata的过滤是提高威胁情报质量的一个重要手段。 尽管还有很多其他类型的无效的rdata,但是相比IP地址来说,其他种类的数据影响较小。因此本文主要讨论IP地址。...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"所谓Rdata是指在DNS记录中与类型相关的数据部分。比如对于DNS的A记录中的IPv4地址或者MX记录中的主机名及其优先级。\n\n在分析DNS的数据过程中,常常能见到各种不同种类的怪异的Rdata。我们把不能有效反应域名和rdata的对应关系的数据称为“无效Rdata”。对这些无效Rdata进行分析是理解DNS数据的一个有趣的切入点。\n\n另外,结合最近火爆的威胁情报,发现很多的数据源中,都包含了这些“无效的Rdata”,...
29
post
null
2016-10-14T20:20:38.000Z
63873b9a8b1c1e0007f52ee8
a-quick-stats-on-the-608-083-mirai-ips-that-hit-our-honeypots-in-the-past-2-5-months
0
2018-10-06T08:55:30.000Z
public
published
null
2016-10-15T11:21:49.000Z
A quick stats on the 608,083 Mirai IPs that hit our honeypots in the past 2.5 months
<!--kg-card-begin: markdown--><p>Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, a...
Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investigations show that this malware mainly infects IoT devices, e.g., CCTV, and TCP ports of 23 and 2323, whic...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"Over the last few weeks Mirai, a DDoS botnet family which is believed to be responsible for the large attacks against Brian Krebs on September 13, 2016, has become a hot topic in security community. Previous investig...
30
post
null
2016-10-14T20:31:53.000Z
63873b9a8b1c1e0007f52ee9
new-mirai-variant-with-dga-chinese-version
0
2020-08-11T03:52:24.000Z
public
published
null
2016-12-12T04:10:57.000Z
Mirai 变种中的DGA
<!--kg-card-begin: markdown--><h3 id="">更新历史</h3> <p>2016-12-09 首次发布<br> 2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误</p> <h3 id="">概要</h3> <p>两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。</p> <blockquote> <p>&lt;<a href="__GHOST_URL__/a-few-observations-of-the-new-mirai-variant-on-port-7547/">A Few Observations of Th...
更新历史 2016-12-09 首次发布 2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误 概要 两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。 <A Few Observations of The New Mirai Variant on Port 7547> 我的同事Ye Genshen快速设置了一些蜜罐,并且很快取得收获:11月28日一天就捕获了11个样本。 迄今为止,我们的蜜罐已从6个托管服务器捕获了53个独立样本。 在分析其中一个新样本时,我的同事Qu Wenji发现一些类似DGA的代码,并猜测变种中包...
{"version":"0.3.1","atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"### 更新历史\n2016-12-09 首次发布\n2016-12-12 更新图0,修正了我们DGA实现中一处TLD选择的错误\n\n###概要\n\n两个星期前,我们发现2个新的感染载体(也即TCP端口7547和5555变种)被用来传播MIRAI恶意软件。\n\n> <[A Few Observations of The New Mirai Variant on Port 7547](__GHOST_URL__/a-few-observations-...
31
post
null
2016-10-23T13:43:56.000Z
63873b9a8b1c1e0007f52eea
a-dyn-twitter-ddos-event-report-and-mirai-botnet-review
0
2018-10-06T08:55:47.000Z
public
published
null
2016-10-23T14:21:21.000Z
关于 dyn / twitter 受攻击情况的说明和 mirai 僵尸网络的回顾
<!--kg-card-begin: markdown--><p>【更新记录】</p> <p>2016-10-23 初始版本<br> 2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。</p> <p>北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。</p> <p>目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标...
【更新记录】 2016-10-23 初始版本 2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。 北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,对本次网络事件提供数据、加以分析并做了溯源跟踪。 目前我们已经能够确定本次事件是一次DDoS网络攻击事件,攻击目标主要是Dynamic Network Services(dyn)公司,twitter、paypal、g...
{"version":"0.3.1","markups":[],"atoms":[],"cards":[["markdown",{"cardName":"card-markdown","markdown":"\n【更新记录】\n\n2016-10-23 初始版本\n2016-10-27 获得了少量攻击现场数据,分析结果与之前观点吻合一致。\n\n\n北京时间2016年10月21 日晚间,北美地区大量反馈若干重要的互联网网站无法正常访问。涉及到的网站包括 twitter, paypal,github等等,由于这些网站与北美地区日常生活强烈相关,这次网络故障被北美主要媒体广泛报道,也引起了安全社区的强烈关注。我们与国外安全社区一起协同,...
32
post
null
2016-10-27T15:41:40.000Z
63873b9a8b1c1e0007f52eeb
a-mirai-botnet-c2-data-analysis
0
2018-10-06T08:56:11.000Z
public
published
null
2016-10-27T16:04:02.000Z
关于 mirai 僵尸网络控制主机的数据分析
"<!--kg-card-begin: markdown--><p>之前的文章中已经提及,我们的僵尸网络跟踪系统(...TRUNCATED)
"之前的文章中已经提及,我们的僵尸网络跟踪系统对mirai僵尸网络控制主机(...TRUNCATED)
"{\"version\":\"0.3.1\",\"markups\":[],\"atoms\":[],\"cards\":[[\"markdown\",{\"cardName\":\"card-ma(...TRUNCATED)
33
post
null
2016-11-29T03:32:51.000Z
63873b9a8b1c1e0007f52eec
a-mirai-botnet-evolvement-new-variant-and-old-c2
0
2018-10-06T08:56:25.000Z
public
published
null
2016-11-29T10:40:18.000Z
德国电信断网:mirai僵尸网络的新变种和旧主控
"<!--kg-card-begin: markdown--><p>【更新】</p>\n<ol>\n<li>2016-11-29 18:40:00 初始版本</li>\(...TRUNCATED)
"【更新】\n\n\n 1. 2016-11-29 18:40:00 初始版本\n 2. 2016-11-29 20:10:00 增加了对德国(...TRUNCATED)
"{\"version\":\"0.3.1\",\"markups\":[],\"atoms\":[],\"cards\":[[\"markdown\",{\"cardName\":\"card-ma(...TRUNCATED)
34
End of preview. Expand in Data Studio

Dataset Card for Dataset Name

This dataset card aims to be a base template for new datasets. It has been generated using this raw template.

Dataset Details

Dataset Description

  • Curated by: [More Information Needed]
  • Funded by [optional]: [More Information Needed]
  • Shared by [optional]: [More Information Needed]
  • Language(s) (NLP): [More Information Needed]
  • License: [More Information Needed]

Dataset Sources [optional]

  • Repository: [More Information Needed]
  • Paper [optional]: [More Information Needed]
  • Demo [optional]: [More Information Needed]

Uses

Direct Use

[More Information Needed]

Out-of-Scope Use

[More Information Needed]

Dataset Structure

[More Information Needed]

Dataset Creation

Curation Rationale

[More Information Needed]

Source Data

Data Collection and Processing

[More Information Needed]

Who are the source data producers?

[More Information Needed]

Annotations [optional]

Annotation process

[More Information Needed]

Who are the annotators?

[More Information Needed]

Personal and Sensitive Information

[More Information Needed]

Bias, Risks, and Limitations

[More Information Needed]

Recommendations

Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.

Citation [optional]

BibTeX:

[More Information Needed]

APA:

[More Information Needed]

Glossary [optional]

[More Information Needed]

More Information [optional]

[More Information Needed]

Dataset Card Authors [optional]

[More Information Needed]

Dataset Card Contact

[More Information Needed]

Downloads last month
70

Models trained or fine-tuned on kenshinx/netlab-blogs