<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.stratosphereips.org/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/4/1/new-slips-version-v1119-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/slips-adaptive-immunity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/3/22/slips-negative-selection-regex</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/3/3/new-slips-version-v1118-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/2/23/slips-ad-https-module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/7badd73c-7aeb-40e5-bb96-450ab67c19a2/Slips+Anomaly+Detection+Example</image:loc>
      <image:title>Stratosphere IPS Research Blog - HTTPS Anomaly Detection in Slips: Adaptive Baselines for Real Traffic - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/2/4/rethinking-cybersecurity-immunity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/24bec5b3-480a-4575-98a1-3ac1c266f938/blog_image.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Rethinking Cybersecurity Defense: Principles from Biological Immunity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/1/25/netsecgame-a-framework-for-training-and-evaluating-ai-agents-in-network-security-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/2c540d93-bbf5-4076-962a-6587a6397896/tui_demo_trimmed.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - NetSecGame - A Framework for Training and Evaluating AI Agents in Network Security Environments - Make it stand out</image:title>
      <image:caption>Example of Manual Play with Interactive TUI agent</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2026/1/30/new-slips-version-v1117-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/12/1/new-slips-version-v1116-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/10/31/new-slips-version-v1115-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/10/23/ai-attackers-in-your-pocket-how-small-language-models-can-outsmart-cyber-defenses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/6cb60af2-3666-4a00-950d-4052db6495b3/methodology.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - AI Attackers in Your Pocket: How Small Language Models Can Outsmart Cyber Defenses - Make it stand out</image:title>
      <image:caption>Figure 1: Fine-tuning methodology</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1761219469728-FMO30HSVGQBUTVIFPME9/gpt4_keyactions.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - AI Attackers in Your Pocket: How Small Language Models Can Outsmart Cyber Defenses - Figure 2b: GPT-4 action transitions</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1761219469628-UMQ96JMPH5XR2BXF34VN/zephyr_ft_keyactions.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - AI Attackers in Your Pocket: How Small Language Models Can Outsmart Cyber Defenses - Figure 2a: Hackphyr action transitions</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/10/14/new-slips-version-v1114-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/9/1/new-slips-version-v1113-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-01</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/7/31/new-slips-version-v1112-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/7/3/new-slips-version-v1111-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/6/5/how-well-do-llms-perform-on-a-raspberry-pi-5</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/426d73a2-7117-4ea9-a578-92aa68c65275/table-1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>Table 1: A quick comparison of engines tested on the Raspberry Pi 5 for LLM performance, covering CPU quantization, speed, memory usage, and notes on suitability.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c136049a-9511-4d6e-b182-8e2074441076/table-2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>Table 2: This table compares various LLM models tested on the Raspberry Pi 5, highlighting disk size, RAM usage, tokens per second performance, and quantization methods.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/9b8c54d9-f4be-4b80-9126-723dabf1e46e/fig-1-models_heatmap_rpi5_Q4.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>Figure 1: This heatmap compares the performance of different LLM models on the Raspberry Pi 5, highlighting their pass rates across various promptfoo tasks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a7ad115d-5e80-4bf2-93c0-13036f71d80a/fig-2-perf_test_model.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>Figure 2: This bar chart shows the best-performing models for each promptfoo test on the Raspberry Pi 5, comparing overall best scores and best scores for models with speeds above 8 tokens per second (TPS).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1a144de6-c2fd-4e5e-91df-85912bae6da2/figure-3-models_score.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>This bar chart illustrates the overall performance scores of various LLM models tested on the Raspberry Pi 5 using promptfoo tasks, highlighting their relative effectiveness.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a32a489b-233d-49e5-bb24-bfcd2f6a3b79/figure-4-trade_off.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How Well Do LLMs Perform on a Raspberry Pi 5? - Make it stand out</image:title>
      <image:caption>Figure 4: This scatter plot shows the trade-off between performance scores and tokens-per-second (TPS) of different LLM models on the Raspberry Pi 5. Circle sizes represent RAM usage, highlighting the balance between performance and resource demands.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/6/5/guest-post-a-graph-based-approach-to-cyber-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f910647d-a1ef-45f8-8702-cf024d48836c/fig0.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Guest Post: A Graph-Based Approach to Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/7ad68d7f-5a44-4ac3-a80a-7156bb8f5e53/fig1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Guest Post: A Graph-Based Approach to Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f1198760-324b-4753-b2d9-cc5ac844ce66/fig2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Guest Post: A Graph-Based Approach to Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/b92876cc-d1f8-45bc-ae21-76374cd58359/fig3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Guest Post: A Graph-Based Approach to Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/0ff32e2c-cbcf-4852-b382-6efc603d22d1/fig4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Guest Post: A Graph-Based Approach to Cyber Threat Intelligence - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/6/5/exploring-llms-for-cybersecurity-our-icaart-2024-extension-paper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a8658e38-620c-4c17-a67a-8b4e436f78fc/fig1-react_agent-drawio.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Exploring LLMs for Cybersecurity: Our ICAART 2024 Extension Paper - Make it stand out</image:title>
      <image:caption>Fig 1: The ReAct agent prompt structure and workflow [19]. The prompt at each stage consists of several components marked with different colors.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/578d9766-68ea-4faa-8412-a992484f42dd/fig2-Design+of+RL+for+Agents+and+Game+Environment.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Exploring LLMs for Cybersecurity: Our ICAART 2024 Extension Paper - Make it stand out</image:title>
      <image:caption>Fig 2: Setup of both NetSecGame topology versions: small scenario with the blue parts and full scenario in green</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/5/26/new-slips-version-v1110-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/4/30/new-slips-version-v119-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-30</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/3/31/new-slips-version-v118-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/2/28/new-slips-version-v117-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/2/24/introducing-aracne-a-new-llm-based-shell-pentesting-agent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f29b6dc9-45bb-457b-89b4-fb017c355f74/Screenshot+2025-02-24+at+22.38.51.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing ARACNE, a new LLM-based shell pentesting agent - Make it stand out</image:title>
      <image:caption>Figure 1: ARACNE connection diagram. The execution begins when the user provides a goal. The Organizer module then passes it to the Planner module. Afterward, the Planner module generates an attack plan which is then passed to the Interpreter module. The result of the Interpreter module is a Linux terminal command, which the Organizer module then executes in the SSH. Then, the Organizer module retrieves the output of the command and stores it along with the previous plan, the command itself, and the goal into a context file. This file’s content is then passed either to the Planner module or to the Summarizer module, depending on whether summarizing is enabled or not. The Summarizer module’s actions are described in the following paragraphs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/0d4a1ad5-bb9a-43b0-a5f3-5db12280a805/Screenshot+2025-02-24+at+22.43.55.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing ARACNE, a new LLM-based shell pentesting agent - Make it stand out</image:title>
      <image:caption>Figure 2: Function that handles the SSH connection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1b4421b6-0f0c-4d7a-ae44-b0f0419f1ea5/Screenshot+2025-02-24+at+22.49.06.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing ARACNE, a new LLM-based shell pentesting agent - Make it stand out</image:title>
      <image:caption>Table 1: Results of the attacks without enabling the Summarizer</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1c87626d-534a-4f2a-b219-aba3bf318142/Screenshot+2025-02-24+at+22.49.13.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing ARACNE, a new LLM-based shell pentesting agent - Make it stand out</image:title>
      <image:caption>Table 2: Results of the attacks with the Summarizer enabled</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/1/31/new-slips-version-v116-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2025/1/3/new-slips-version-v115-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/11/29/new-slips-version-v114-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/10/31/new-slips-version-v113-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/10/30/aip-v300-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c10be670-1e22-4ace-b53e-272c797cc19b/AIP_Diagram.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - AIP v3.0.0 is Here! - Make it stand out</image:title>
      <image:caption>AIP takes incoming network attacks captured by Zeek, processes the data, and each model will generate its own blocklist prioritising a specific aspects of the incoming attacks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/9/30/new-slips-version-v112-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-30</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/9/4/27l2z8pfpxhkszjac6h8udwlax6c50</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/9/3/introduction-to-security-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1725363208344-PEYVYAC7SEZE9HO7G9XI/unsplash-image-_HEqJviJ7KY.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Czech Technical University in Prague’s "Introduction to Security" Class is now a Free Online Course! - Easily one of the best subjects I’ve studied at FEE</image:title>
      <image:caption>"Nice class offering a lot of hands-on experience and fun assignments. Easily one of the best subjects I’ve studied at FEE." - OI MSc Cybersecurity</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1725363273928-WLEUSEXYLH0UIV5DJGUC/unsplash-image-ZnOqBzHaDVQ.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Czech Technical University in Prague’s "Introduction to Security" Class is now a Free Online Course! - The most well-prepared course I've taken so far</image:title>
      <image:caption>This was undoubtedly the most well-prepared course I've taken so far, including through my bachelor's degree. The classes were highly practical, with almost every concept being not only taught but also demonstrated. Ensuring that everyone had the opportunity to replicate the learning experience was a priority.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/8/27/towards-better-understanding-of-cybercrime-the-role-of-fine-tuned-llms-in-translation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/594d58ff-8c79-4fa6-8046-442eb59d680d/Screenshot+2024-08-27+at+17.57.27.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/7/31/new-slips-version-v11-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/7/16/best-short-paper-award-at-adampd-workshop-euro-sampp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f96197e1-06d9-4aab-a266-836c0908f418/IMG-20240709-WA0009.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Best Short Paper Award at AD&amp;amp;D Workshop EURO S&amp;amp;P! - Make it stand out</image:title>
      <image:caption>Workshop Chair, Emmanouil Vasilomanolakis, Technical University of Denmark (left); Muris Sladić, Czech Technical University in Prague (center); Sebastian Garcia, Czech Technical University in Prague (right)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/7/16/shoutout-to-nlnet-foundation-our-continuous-supporter</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/068bebf9-536d-4971-962f-2498073a56c6/NLnet_Foundation_logo.svg.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Shoutout To NLnet Foundation, Our Continuous Supporter! - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/7/3/google-summer-of-code-2024-in-stratosphere-blog-for-the-first-month-of-sekhar-kumar-dash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/8ecaabdb-6c17-4210-9b23-267ad6ccdfce/b7830459-320a-49fa-947b-d9662a42482f.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Google Summer Of Code 2024 In Stratosphere. Blog for the first month of Sekhar Kumar Dash - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/6/14/new-slips-version-v1015-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/5/31/introducing-stratocyberlab-local-cyber-range-with-ai-assistant</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5f9cf150-95d4-4d0c-b059-8769799508c5/image+%285%29.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing StratoCyberLab: A Local Cyber Range To Help You Get Your Cyber Skills to The Next Level - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c6ed18cf-01bd-4a8a-a486-f3024a120c53/image+%285%29.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing StratoCyberLab: A Local Cyber Range To Help You Get Your Cyber Skills to The Next Level - Help On Your Journey</image:title>
      <image:caption>The Assistant AI helps and facilitates your learning through your cybersecurity journey.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5f86a2cc-e3ca-4bc9-8421-3170c8575b43/image+%285%29.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing StratoCyberLab: A Local Cyber Range To Help You Get Your Cyber Skills to The Next Level</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/5/15/new-slips-version-v1014-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/4/16/new-slips-version-v1013-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-04-16</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/3/15/new-slips-version-v1012-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/3/4/participation-in-icaart-2024-rome</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/979d3803-b26d-42b1-92df-df8b49cec320/ootc_1.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Participation in ICAART 2024, Rome - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/e3f327a8-cccf-4dff-a824-bc76a6eb6388/ootc2.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Participation in ICAART 2024, Rome - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/fad19a67-fbb3-4674-a1b1-21eb279239a5/image+%284%29.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Participation in ICAART 2024, Rome - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/2/29/announcing-google-summer-of-code-2024-participation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1bcd1750-7d91-4387-a4b1-bbe228e57b2d/strato-gsoc.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Announcing Google Summer of Code 2024 Participation! - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/7495a824-c954-4c61-a614-5572b742e312/mentors-gsoc.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Announcing Google Summer of Code 2024 Participation! - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/2/23/analysis-and-understanding-of-malware-of-the-pyration-family</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/69f0fac6-4fb0-45d0-8cf3-b6717a3a80eb/figure1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 1: Unzipping the .zip file of the original malware</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a1559153-ebdb-4640-8a5e-39c3c6405959/figure2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 2: Extracting the contents of the file</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/e806b05d-204b-43d0-ba7e-a4ebcf6dcb96/figure3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 3: Creating a directory for decompiled files</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/14844f5c-fb4d-4b9b-b7c6-c4b51424bd11/figure4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 4: Function in charge of taking screenshots in the bot</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a938f2cb-9a33-428e-a5b1-4958b6db564a/figure5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 5: Detect if the OS is Windows or not</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/3d2f0088-7b99-4499-9554-52df74533478/figure6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 6: Antivirus detector for macOS.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/df6e9348-f09d-4d35-beb2-de963cc9eeda/figure7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 7: A loop that sends the key log to the server. App.KEYLOG_SECONDS_TO_LOOP_SLEEP = 60</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/7afb2abe-91f0-46b2-8e7d-d34301b56ac0/figure8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 8: Both the first and second functions in the bot to manage files. One to download files from the server and one to write new ones. Both work locally.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5c90a19c-fe47-48e0-b27f-49b43aac2f15/figure9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 9: Function used for anonymous browsing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/e4c17a28-e381-47e0-b85d-48fff73c8ad2/figure10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 10: Function responsible for command execution.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/d751d621-d9e1-4ad1-8fca-67c8fd6b1502/figure11.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - Make it stand out</image:title>
      <image:caption>Figure 11: Diagram of all functions and features in the client-side code.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/dffd348e-be13-4204-9a3f-1f62c26cab48/author.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis and understanding of malware of the PyRation family - About the Author</image:title>
      <image:caption>My name is Tomas Nieponice, I'm a 16-year-old high school student from Argentina. Since early in my life I have been interested in technology and software. I am a professional Rubik’s cube solver and astronomy student.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/2/15/new-slips-version-v1011-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2024/1/15/new-slips-version-v1010-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/12/18/new-slips-version-v109-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/11/16/new-slips-version-v108-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-11-16</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/10/9/use-case-uptimerobot-amp-stratosphere-iot-laboratory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/269cd054-287a-4057-a55d-854c95f667fe/uptimerobot-1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Use Case: UptimeRobot &amp;amp; Stratosphere IoT Laboratory - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/bd1db0e5-486d-44e7-b7be-768e34b262db/uptimerobot-3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Use Case: UptimeRobot &amp;amp; Stratosphere IoT Laboratory - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/9/15/new-slips-version-v107-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-15</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/9/10/llm-in-the-shell-generative-honeypots-at-esorics-2023-poster-session</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-10-09</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/9/10/stratospheres-slips-and-the-ai-vpn-to-appear-at-black-hat-europe-2023-arsenal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1f7b8ee5-cf71-49f4-ba6f-11788428b3b5/Screenshot+2023-09-10+at+11.23.42.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Stratosphere's Slips and the AI VPN to appear at Black Hat Europe 2023 Arsenal! - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/8/4/generating-your-own-blocklists-with-the-stratosphere-aip-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a6a1dcb7-61fb-4ab9-93bb-ff98774afaa0/Stratosphere+Blocklist+Generation+Project+-+Simplified+pipeline.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Generating Your Own Blocklists with the Stratosphere AIP Framework - Make it stand out</image:title>
      <image:caption>Figure 1 - Simplified diagram of the AIP framework process from data ingestion to feed generation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5f309814-c1bb-41ad-b4d8-75bab819105f/digital-ocean-min-requirements.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Generating Your Own Blocklists with the Stratosphere AIP Framework - Make it stand out</image:title>
      <image:caption>Figure 2 - Digital Ocean droplet for this guide is a 1GB 1CPU droplet, with a regular SSD, of 25GB storage.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a3ed000d-0fcb-40b2-b12f-fbff4ffc0fa1/zeek-data.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Generating Your Own Blocklists with the Stratosphere AIP Framework - Make it stand out</image:title>
      <image:caption>Figure 3 - Directory with the Zeek logs output with 3 days of data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/3cb574ce-13b6-4515-be9e-325e045d854d/aip-runs-through-docker.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Generating Your Own Blocklists with the Stratosphere AIP Framework - Make it stand out</image:title>
      <image:caption>Figure 4 - AIP running as a docker container builds the attack metrics based on Zeek input data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/4c8ad62f-e6e2-4688-873a-afafd34015c4/aip-generated-data-output.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Generating Your Own Blocklists with the Stratosphere AIP Framework - Make it stand out</image:title>
      <image:caption>Figure 5 - AIP writes data in the data/output folder where all the output blocklists can be found</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/8/2/google-summer-of-code-updates-from-week-9-july-24th-to-july-28th</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-08-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/30/introducing-collectress-consistent-threat-intelligence-feed-collection-and-storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/d7f27d21-83a7-440d-a75b-9dfe0ff56234/collectress.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Collectress: Consistent Threat Intelligence Feed Collection and Storage - Make it stand out</image:title>
      <image:caption>Collectress is a free software tool developed by Stratosphere: https://github.com/stratosphereips/collectress</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/381eaf2f-45d8-4dc4-80ae-d1f9d597f5e5/collectress-2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Collectress: Consistent Threat Intelligence Feed Collection and Storage - Make it stand out</image:title>
      <image:caption>Figure 1 - Collectress downloading 43 threat intelligence feeds, featuring a simple progress bar.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/26/google-summer-of-code-updates-from-week-8-july-17th-to-july-21th</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/b638abc6-b433-4299-85cf-f0f31076f00b/Screenshot+2023-07-26+at+9.23.43.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Google Summer of Code Updates from Week #8  (July 17th to July 21th) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/18/google-summer-of-code-updates-from-week-7-july-10th-to-july-14th</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/14/slips-and-the-ai-vpn-presented-at-the-20th-dimva-tool-arsenal-in-hamburg-germany</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/609326cd-1130-4563-9377-8d7b47b90a18/IMG_6536.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Slips and the AI VPN presented at the 20th DIMVA Tool Arsenal in Hamburg, Germany - Make it stand out</image:title>
      <image:caption>Veronica Valeros (left) in the kick off of the arsenal ready to present the AI VPN at DIMVA 2023.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/11/google-summer-of-code-updates-from-week-6-59cg8-pydmd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-11</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/11/google-summer-of-code-updates-from-week-5-59cg8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-11</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/11/google-summer-of-code-updates-from-week-4-gjjkx</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-11</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/7/10/the-world-of-malicious-ips-creating-blocklists-from-honeypot-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f2c752af-a5f0-47b3-80dd-9b71a78184d3/plot1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - The World of Malicious IPs: Creating Blocklists from Honeypot Traffic. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/3a2ec487-5ff2-40cf-8c00-36e923ae77a3/plot2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - The World of Malicious IPs: Creating Blocklists from Honeypot Traffic. - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/6/30/new-slips-version-v106-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/6/21/google-summer-of-code-updates-from-week-3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-07-05</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/6/20/google-summer-of-code-updates-from-week-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/6/6/google-summer-of-code-updates-from-week-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/5/30/new-slips-version-v105-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/5/8/new-slips-version-v104-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/5/5/announcing-google-summer-of-code-2023-projects</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/3/31/new-slips-version-103-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/2/28/new-slips-version-102-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/1/31/new-slips-version-101-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2023/1/26/winer-conti-award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/12/8/installing-h0neytr4p-in-the-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/b42604a5-9638-402e-a3a1-b4aa74c4e6ac/Step+2+-+Select+the+option+to+create+a+new+droplet.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 2: Select the option to create a new droplet</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/07cf703d-2d03-41cb-b885-4650871e9853/Step+3+-+Selecting+the+base+image+for+the+honeypot</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 3: Selecting the base image for the honeypot</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/e40ff345-5abb-41fa-8b84-c7886caab2e9/Screenshot+2022-12-08+at+19.15.34.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 4: Selecting the server specs (memory, CPU, storage, etc)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/fcd8f4b2-43ca-41a0-bd19-7283b6065104/Screenshot+2022-12-08+at+19.15.47.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 5: Selecting the region of the cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/a6f0fcad-2767-4ad1-acb1-44ad712bb872/Screenshot+2022-12-08+at+19.16.18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 6: Select the authentication method: SSH Key or Password.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/745b7ee4-1f1f-499d-ad18-0204905c6961/Screenshot+2022-12-08+at+19.16.35.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 7: Select the number of droplets to create and a hostname for the droplet.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/006adc5a-00f4-46b1-8e8d-56dd14d5a9fd/Screenshot+2022-12-08+at+19.21.47.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 8: Select create droplet to start instantiating the new cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c7f8268e-80d3-4f12-8675-f3cbe44d3ea3/Screenshot+2022-12-08+at+19.23.26.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 9: Login to the newly created cloud server using SSH using the information provided in the previous steps and the assigned IP address visible from the account dashboard.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/3b439754-ebc3-4631-9a5a-85b0d11a25f0/Screenshot+2022-12-08+at+19.26.30.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 10: Successful login into the new cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/74bdae54-c315-4d9f-8cc1-4519912b5566/h0neytr4p_1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/ea44a39d-0c0d-43e3-809a-8359226892ad/h0neytr4p_1.2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c3df5654-fdc4-45b1-a7c3-4056fbe42515/h0neytr4p_4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/868e817d-1c67-4bd9-8c08-2495e9e42136/h0neytr4p_5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/8dc66cda-b360-4614-9d2a-f79cd22b8fa4/h0neytr4p_2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/eccaf143-b48f-474e-8249-e4478ff7ccd1/h0neytr4p_3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/08c23275-d654-4874-a3aa-6cc736643d80/Screenshot+2022-12-08+at+19.38.16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/22f27ae8-023e-4f08-ac69-75f7af78eb7d/h0neytr4p_7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c114f36c-a3ec-4c6c-aac2-9808cb78850e/Screenshot+2022-12-19+at+20.47.19.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing h0neytr4p honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/12/2/new-slips-version-100-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/11/11/new-slips-version-096-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/8/30/new-slips-version-095-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-08-31</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/7/31/new-slips-version-093-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/7/19/slips-in-blackhat-us-2022-arsenal-in-las-vegas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-19</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/7/5/new-slips-version-092-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/6/6/writing-a-slips-module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/6/6/new-slips-version-091-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/5/3/installing-glutton-honeypot-in-the-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/ca76a7eb-eaa1-4806-ba13-c090525ca800/create-dropplet-0.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 2: Select the option to create a new droplet</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/725cc128-d528-495a-b357-3538994cb0ab/Screenshot+2022-05-03+at+15.27.40.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 3: Selecting the base image for the honeypot</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/e6d3d216-60b5-4d45-af0a-95076838a1f6/Screenshot+2022-05-03+at+15.27.50.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 4: Selecting the server specs (memory, CPU, storage, etc)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/dfbef166-68c0-4390-8492-67f431fcab27/Screenshot+2022-05-03+at+15.28.05.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 5: Selecting the region of the cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/13ea0865-714f-4b46-88ee-115466b7de12/Screenshot+2022-05-03+at+15.37.58.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 6: Select the authentication method: SSH Key or Password.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/34aa513d-b7b8-44dd-9b66-e962d8bf4d9d/Screenshot+2022-05-03+at+15.38.15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 7: Select the number of droplets to create and a hostname for the droplet.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f9cbd69e-3e17-464c-b5aa-0cd7bfb7858f/Screenshot+2022-05-03+at+15.40.28.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 8: Select create droplet to start instantiating the new cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/4bb9f457-0aaa-4332-a2fe-5719dd6b70f7/Screenshot+2022-05-03+at+15.43.28.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 9: Login to the newly created cloud server using SSH using the information provided in the previous steps and the assigned IP address visible from the account dashboard.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/38fcc992-2a82-46ab-bdc1-9afae42019c7/Screenshot+2022-05-03+at+15.46.58.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Step 10: Successful login into the new cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/61f3b530-f05b-4444-bdf4-a1cb70377708/Screenshot+2022-05-03+at+16.47.30.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/9e10f066-4f80-4d15-aa16-c5c75e2223d2/Screenshot+2022-05-03+at+16.51.21.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/4d283909-4b22-4948-882f-df3445ada97a/Screenshot+2022-05-03+at+17.10.18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/69c03368-c50a-48dc-a619-e570938a804d/Screenshot+2022-05-03+at+17.19.50.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/b9129804-b7b6-41e8-90c5-4615199496fe/Screenshot+2022-05-03+at+17.30.21.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5808e4f0-50aa-49da-b8d0-da5a30183a13/Screenshot+2022-05-03+at+17.30.48.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing Glutton Honeypot in the Cloud - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/4/28/new-slips-version-090-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/4/1/new-slips-version-085-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/2/17/new-slips-version-084-is-here</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2022/2/17/studying-the-distribution-of-computational-propaganda-with-serpapi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1645130712626-KMBOQB70VR911XOSVF8K/Diff+between+linking+to+and+from+a+URL.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying the Distribution of Computational Propaganda with SerpAPI - Make it stand out</image:title>
      <image:caption>Difference between extracting links from a URL, and to a URL</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1645130897305-HRHJUHGB0CWO0E0952IX/serpapi-logo.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying the Distribution of Computational Propaganda with SerpAPI - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1645131034564-GMDELWGKUSEX0OLQKHNO/How+to+use+SerpAPI+to+find+links.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying the Distribution of Computational Propaganda with SerpAPI - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/11/29/studying-cybercrime-is-fun-an-overview-of-five-years-of-research-surrounding-the-geost-botnet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890471622-QPDDVI2Q2GVY8M8IU9MI/radhika.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet</image:title>
      <image:caption>What is this unknown web access? It looks like a command and control botnet panel… Well it is!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890532887-WX6MNEPSXHKBHDRL5UPP/wacco.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890619480-IAN2QWVD1X7XY8RSM2QR/bheu.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890739549-537XZXUJXKCICLRCGLI4/bhusa.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890803458-CH593QNPIS85ETEB6S9G/botconf.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1635890851189-WVCSQYBI6BF0PY84QG2K/poster.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/10/12/new-slips-version-08-is-here-more-detections-whitelists-and-train-your-own-machine-learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/9/20/the-prevalence-of-dns-over-https-by-karel-hynek</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-09-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1632148930476-6FNAUGI8NOD0CDGG8B8Z/org2-2020-doh-dot-doq-1024x507.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - The prevalence of DNS over HTTPS By Karel Hynek - Make it stand out</image:title>
      <image:caption>Figure 1 — The amount of DoH/DoT/DoQ requests in Czech Technical University traffic during 2020. DoQ is not visible due to the small amount of requets. Note, the gap from 2020/09/07 to 2020/09/17 was due to issues with the sensors.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1632149294665-2SQ3NRTRTE4QRKNCP7DY/org3-doh-user-country-norm.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - The prevalence of DNS over HTTPS By Karel Hynek - Make it stand out</image:title>
      <image:caption>Figure 2 — Line plot of the normalized amount of observed DoH connections per user per day. Vertical lines are weekends.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/9/20/create-and-test-your-own-taxii-server</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-10-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/6/2/dissecting-a-rat-analysis-of-the-saefko-rat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659553439-KNYEICJHZ2UXFBC931Q2/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 2. The APK function GetLocationInfo() retrieves the longitude and latitude of the victim’s device location based on the IP address by connecting to the site https://ipinfo.io/geo.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659703539-LZ39HPD3CG8N27FRS1V2/image21.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 4. APK code with specifications of the database URL ‘https://experimentsas.000webhostapp.com/server.php’ and other necessary parameters.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659785187-D6SC1Z7SULTJM0MSFWC0/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 6. The interface that the controller uses to execute C&amp;C commands. The interface contains 3 tabs to separate the commands sent over IRC, HTTP and TCP. The tab for the C&amp;C commands over IRC is command-line alike. The phone connects to three IRC servers listed in the beginning of Figure 6: irc.immortal-anime.net, irc.caelestia.net, irc.charrersweb.nl.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659818290-CCKQ05VI2PHKEXOD9ZFK/image12.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 7. APK code that aims to establish a connection with an IRC server with specific parameters. The function generates a list of 5 IRC servers and sends it to the C&amp;C database.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659874153-M2GH6SARGZYSDA0ZE2XO/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 8. IRC servers listed in the APK code. The infected device connects to IRC servers from this list of 99 servers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622659985502-EDGUZ9TIUGCBSMY468E6/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 9. APK function GenerateIRCInfo() that aims to connect to an IRC server with specified parameters IRC_SERVER, IRC_PORT and IRC_NICKNAME.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622660071346-FYS21KE50EOTSSIXTM7H/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 10. APK function update_server_informations that sends the information about the victim’s connected IRC servers to the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624285304168-NUX8U3Z63PBHU76RQDUY/Screenshot+from+2021-06-21+16-21-08.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 11. The list of C&amp;C commands that can be executed over IRC channels.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622660496138-OPD92XC41GA8VISVGH35/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 12. Connection from the phone to the IRC server chat.freenode.net. The connection was established and immediately terminated.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622660696420-VPLR9PP9KON59I8R5ALB/image15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 13. Reestablished connection from the infected device to the IRC server chat.freenode.net.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622661157137-9W9XN59VRBZTUFR42F4W/image16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 14. The packet with the USER command sent from the phone to the IRC server. The phone’s username is 6 letters long randomly generated string.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622661324672-Q7XTWBIOIO8Q9QB3MGE5/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 15. Function GetNickname() inside the APK code that randomly generates a 6 letters long string to create the nick of the user in IRC.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1622661453821-A7KXI07M2QS4TV2NXSPD/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 16. Ping and pong between the IRC server and the victim’s phone. The heartbeat continues until the C&amp;C command is received.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624285387273-JHEGO855251DURP4H8DT/Screenshot+from+2021-06-21+16-22-36.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 17. The private message from the C&amp;C with the command ‘location’. The top lines in the figure are the headers of the packet, the lower lines are the content According to the Internet Relay Chat field, the controller’s nick is zelvmd, the IP is 2001:718:2:903:f410:3340:d02b:b918 and it sends the data ‘SASENCODEbG9jYXRpb25UX1QxNjE4MDY2OTgxNjMw’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624287153532-7F8UKVZJ6A578FJP46NY/Screenshot+from+2021-06-21+16-52-00.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 21. The phone’s 6 packets sent as a reply to the C&amp;C command ‘location’. The packets from the phone follow the same structure as the C&amp;C packets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624277072111-X9WRQSQY6SIZBASRKSCD/image22.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 22. The C&amp;C commands are sent to each connected IRC server and the infected device replies to the C&amp;C command in each server.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624277178405-VY2CPRUZ33JFZ6EQCHHS/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 23. The queue of HTTP requests with C&amp;C commands to be executed on the phone. These commands will be executed according to the refresh rate parameter set in the configuration folder.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624277254967-B0GG0OYR21PAU5J12X03/image18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 24. A list with C&amp;C commands that are possible to perform over TCP connection between the controller and the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624277463279-CBS5JND9GAMC5B7Z0Q7D/image14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 26. A 3-way TCP handshake to establish the connection over TCP/8000 between the phone and the controller.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624282062994-90ALQF8ASGS77YFVPR9L/image13.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 29.  The data field of the second packet sent by the phone after receiving the C&amp;C command. The data is base64 encoded.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624282116269-FUABEQ6DCVP00KOH91SR/image19.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 30. Function sendMessage() in the APK code that aims to send the information from the phone to the C&amp;C. The function sends two packets: (i) a packet with the data length of the next packet and (ii) a packet with the actual data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624282206395-413U0R03ARY2JKM3KEEA/image24.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 31. The data field of the packet with the C&amp;C command ‘read SentSMS’ that aims to retrieve all SMS sent from the infected device. The data is base64 decoded.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624282292759-CLNHAMFH8ZY5776IC4N7/image20.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 32. The data field of the second packet sent from the phone as a reply to the C&amp;C command ‘read sentSMS’. The data has a length of 472 and is base64 encoded.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624282554079-24E9CUSH93L839ER7YF4/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 33. All the connections performed to the 000webhost.com database from the phone. In total, there are 21 connections.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624285057856-FGHOPSJJOCR8SZ9UTX1Q/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 34. All connections from the phone to IRC servers over ports 6667/TCP, 6668/TCP, 6669/TCP, 7000/TCP, and 7020/TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624285105591-XYODXCYH9AS6YXYDVD9G/image25.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>Figure 32. Five connections over TCP established with the C&amp;C. The connections were ended with the flags RSTR and S1.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624287533558-DGE4XJC7LKY9CP4CGRVK/image5.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624287615684-8PNH9HPXVVOI9H9HQ2C4/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Saefko RAT. - Make it stand out</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-command-line-androrat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620810119726-MCOLE7ZBSQWBK6UFCJDT/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT. - Make it stand out</image:title>
      <image:caption>Figure 1. Welcome message in the Command-line AndroRAT interface. The message is shown until the infected phone is connected.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620810153711-7AIBERH1YCTC53F16YL2/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 2. The controller IP and port specified during compilation can be seen in the code inside the APK installed in the victim’s device. The phone uses the controller IP 147.32.83.157 and the port 1337 to establish a TCP connection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620810176943-C13F4D4AP17HCEZ9CN7A/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 3.  A 3-way TCP handshake between the controller (147.32.83.157) and the phone (147.32.83.245). The connection was initialized by the phone and there is one retransmission packet.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620810224333-EE4FDQCXATKERHJYBNDN/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 5. Code from the malicious APK that sends the welcome message to the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620810288995-YA5ZY485B9H7NLHXFWEU/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 8. The command line interface of the C&amp;C with the executed command ‘Device Info’ and the phone’s reply. The characters “[36m” and similar seem to be related to a bug in the assignment of colors to the interface.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620812208989-QLGCYB85TI3ZL8Z4TE2D/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 14. Successful 4-way handshake TCP termination between the controller and the targeted phone after the C&amp;C command ‘exit’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620812228745-5A504VSQPOUVI1642JDC/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 15. After the phone received the ‘exit’ C&amp;C command, it still tries to reconnect with the controller. However, the controller already closed the socket after the ‘exit’ C&amp;C command.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620812270867-2UNVPXDKRGML64HQD8JU/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>Figure 16. TOP connections from Wireshark-Statistics-Conversations sorted by the flow duration. The connection between the victim and C&amp;C is the longest.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620812287519-ZELZGKR5KNCDBPQFDHAV/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT. - Make it stand out</image:title>
      <image:caption>FIgure 17. Wireshark displays reconnections to the C&amp;C as the flows of really short duration.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620373303023-DSPFQZ1UVGNN3AZJMYQI/image2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620391948125-AYK6DBG5DUSKSQ0SLC7E/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the Command-line AndroRAT.</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-hawkshaw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620371497334-MDIKDAONDKJQ0ABPPKXB/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 1.  The victim phone starts by connecting to the IP 216.58.201.106 with the server name firebaseinstallations.googleapis.com that indicates a Firebase installation service (FIS).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620371557122-9ZHH4B5AQU6XJL1L6C27/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 2. The victim connects to the Firebase platform (35.201.97.89) with the HawkShaw RAT service to the server name hawkshaw-cae48.firebaseio.com.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620372901640-F1KYY4RBEJISXL380296/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 3. Code from the RAT in the infected device that takes care of connecting to the services api.ipify.org and api6.ipify.org to retrieve the IPv4 and IPv6 IP addresses. This function gets executed after the C&amp;C command sends the command ‘Device Information’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620372926047-XNC86PA9G19BLUJXMVKY/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 4. The C&amp;C interface after the controller sends the command ‘Device Information’ to the victim, that aims to retrieve the details of the victim’s device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620372965959-PM99YGFAS5ONWZO2FTH9/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 5. The victim connects to the IP 216.58.201.74 with the server name firebasestorage.googleapis.com that indicates Firebase Storage.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620651280501-GFPSHY0MS0RNMPMBBMPK/Screenshot+from+2020-07-24+09-53-20.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 6. HawkShaw controller interferes Instagram conversation of the victim’s device. The C&amp;C can send and receive messages in the chat.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620651439389-VCM1NLX1SOQO5QSBCL4Q/Screenshot+from+2020-07-24+11-16-52.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 7. Keylogger C&amp;C command. The C&amp;C captures all the keys clicked on a compromised device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620373207608-7CN44Q9R7XPWT4YI1SLX/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>Figure 8. The duration of the connections between the victims and the HawkShaw online service is short, no more than approx. 13 minutes (785 seconds).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620373303023-DSPFQZ1UVGNN3AZJMYQI/image2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620391948125-AYK6DBG5DUSKSQ0SLC7E/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the HawkShaw.</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/5/6/dissecting-a-rat-analysis-of-the-ahmyth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620303022102-EZY491BJBLE25NR08ZCN/image12.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 1. The establishment of the first connection over TCP between the controller and the infected phone with AhMyth RAT.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620302008963-H1ZLRJPF19N6LFLVD2ZV/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 3.  The function IO.sockets.on that receives the HTTP request from the phone. The C&amp;C parses phone parameters to the function addVictim.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620302035368-0FFDD47UIHUMTTEU1J99/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620302124278-OGMKJEFC292U2M7KS6OH/image13.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 4. Function addVictim of the C&amp;C that receives the parameters of the phone and stores them in the dictionary victimList.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620302197009-HYN63MU7OSI2TDVN5F5S/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 5. The C&amp;C interface main window of AhMyth. It shows the connected infected victim with the parameters sent in the first HTTP request.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620302981424-U3PSW07454Z2AB6JY1SL/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 7. Establishment of the second connection from the phone to the C&amp;C after receiving the ‘open’ packet with the handshake data for the WebSocket protocol.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620330779994-7QIE1GYYBAD9OA8RUGYM/image15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 11. The probe request sent by the infected phone with unmasked data ‘2probe’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620330743380-KCYIYMQIZEWSRJXZHFOB/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 12.  The probe request sent by the C&amp;C with data ‘3probe’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620330839716-NJSACK56E5BX8OE0OGLG/image17.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 13.  The ‘upgrade’ packet sent by the infected phone with unmasked data ‘5’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620330808192-HFBINI4XF8VRJ40CDC5R/image16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 14.  The ‘ping’ packet sent by the infected phone with unmasked data ‘2’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620331231979-6E1KW2MBIOJNVU8B839G/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 15.  The ‘pong’ packet sent by the C&amp;C with data ‘3’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620331255857-2MZSNR1OY0LWX138O8LZ/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 16. The exchange of ‘ping’ and ‘pong’ packets between the phone and the C&amp;C with the setup interval of 25 seconds.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620332512387-VR1GBY8A7KDESFO8SSRV/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 20. Wireshark representation of a phone response on the C&amp;C command ‘Camera List’ that aims to retrieve the list of cameras in the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620332729882-Y56XYJE11FLUI9P4ARYD/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 22. All the connections between the infected phone and the C&amp;C. The longest connection has a duration of 1808.6655 seconds, which is approximately 30 minutes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620332765347-FCSL7GEN3TURC95V1YSS/image14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>Figure 23. Top connections done by the phone sorted by the duration. The connection to Facebook IP address 157.240.30.34 is the longest.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620333920346-DJRVFLVSVDZCM5T3T4PZ/image7.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620334068055-6LDW5809YOVTUJASNE0L/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AhMyth.</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/3/29/dissecting-a-rat-analysis-of-the-androrat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617122754691-BKQQW897KUHV7U0403M5/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 1. A 3-way handshake to establish the first connection between the phone and the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617122132957-HNPWJYCIKZA1T5NXQFEN/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 3. The C&amp;C interface panel displays the parameters of the phone after the infection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617122233330-SJ4NBA68NW9563V97F7I/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 4. Panel in the C&amp;C interface used to send commands to the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617122601142-6LKT86985KVRC15NOJT3/image15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 7. The mapping of each C&amp;C commands (in capital letters) into a single character defined by a number. Found by reverse engineering the APK used to infect the victim.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617122909133-X1M396LCSGUIFQP2CIWI/image14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 8.  Java code from the APK for the function dataHeaderGenerator. This function generates the header for the C&amp;C and phone packets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123002611-HGP9PJEX1YXVP1U2QVGY/image16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 9.  Java code from the malicious APK for the function parse. This function unwraps the C&amp;C command.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123155649-AM2B1P0SSGRNO2UIH3VD/image20.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 10. Analysis of the packet structure of the C&amp;C command ‘Advanced Information’ sent to the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123239327-E6DOJ42XNXDRE5F99TL3/image18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123289641-H5PNRTVE92NRDQRQV40Z/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 11. Mapping value of the C&amp;C command ‘GET_ADV_INFORMATIONS’. The value of this command is 121 in decimal which is 00 79 in hexadecimal.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123741469-3F8088B4Y7WQXY8T92AR/image6.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 12. Analysis of the packet structure of the C&amp;C command ‘Preferences’ sent to the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123760980-CBD6QKHHGTE63GTZRWK2/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 13. Mapping of the C&amp;C command GET_PREFERENCE from Figure 7. GET_PREFERNCES is 21 in decimal, and 00 15 in hexadecimal.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123842475-TFXGBWI9S6C0LSJV1FRD/image21.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 14. Summary of the packet structure of the C&amp;C commands.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617123970072-KJ3NY2LH3BPH00RBWOL9/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 15. Java code from the APK for the command ‘send’. This function sends the packet from the phone according to the specific structure.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124064855-D5HNJUS2QXV9PIIF8QV0/image3.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 16. Packet sent from the phone as an answer to the C&amp;C command ‘get Preferences’. The packet data and its structure is shown.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124209458-VUSJXBELBGDLX7XTG1FN/image19.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 18. The structure of the packet sent from the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124246979-OS12J9FJ2GFV33VN498D/image17.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 19.  Packet data and structure for the C&amp;C command ‘Toast’ with the argument ‘hello’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124379655-XQ8NE7EOGQNTTR5HYBVK/image22.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 20.  The mapping of the C&amp;C command ‘Toast’. The value of this command is 109 which is 00 6d in hexadecimal.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124434413-YMSWO6EFADH04EI3ZZTN/image1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 21. The packet data and its structure of the C&amp;C command ‘Directory List’. The command aims to get the list of files in the specified directory (in our case directory ‘/’).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124457626-MBV66L7LH27LVWNVPSN0/image12.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 22. The phone sends the confirmation about the received command ‘Directory List’. The packet data and its structure is shown.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124571489-352YEQ1K3EZ7S71THIZ4/image13.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 24.  All the connections in the traffic between the phone and the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617124599324-D9PI4ESBOMMXA0A2YZ7F/image23.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>Figure 25. Top connections from the phone from Wireshark -&gt; Statistics -&gt; Conversations -&gt; TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617125170963-K6TRILX8Q260YXCKSFPJ/image9.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1617125357910-J0CPXIV84B56N3DD96N4/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the AndroRAT.</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/2/26/dissecting-a-rat-analysis-of-the-spymax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349033055-UMU6YCF429TCBY02DVYM/image18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 1. A 3-way handshake started by the phone to establish TCP connection with the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349089822-VG40KCDI9AN236YVW6VK/image15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 2. Data sent by the phone after establishing the TCP connection with the C&amp;C. It is shown a hex representation to the left and ASCII representation to the right.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349197429-NK5QWLIOGGUGCG2YZ6XP/image6.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 3. The structure of the first packet sent by the phone. Here it can be seen the data length, gzip magic numbers and delimiters.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349286283-R9TLFI3C3CIAOTA200A8/image14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 4. Decompressed data from the first packet sent by the phone. Done using the CyberChef tool.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349395266-QF64TVLZO34IBKI5L21M/image1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 6. The C&amp;C sent the command ‘calls’ and an APK to fulfil that request. The AndroidManifest.xml content can be seen in the traffic. The analysis was done in the CyberChef tool.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349507452-YH07PP60Q54EUEUD2M6E/image19.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 7. The ‘Delete’ function from the source code of the small APK sent to the victim phone in order to execute the command ‘calls’. It is designed to manipulate call logs in the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349629753-ZNKS4F0CQ4IM99JGMUG9/image7.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 8. The exchange of packets between the C&amp;C and the phone after C&amp;C sends all necessary plugins and APKs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614349766232-WK3A9W3ZK8QQNAF7SWC2/image17.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 9. The command ‘Info’ as sent from the C&amp;C to the phone. After decompression a structure can be seen.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614353989961-TO9YRGYGCP29ESCTIGCY/Screenshot+from+2021-02-26+11-45-03.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 10. UUID decoder tool decodes the string ‘a2fb4aa7-befb-4072-a025-6a2379e5c705‘ sent from the phone. This string is UUID version 4, i.e. randomly generated.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350241522-KEOS41IPC5VAOILWUOHQ/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 12 The rendered background image from the phone after the C&amp;C command ‘Info’. The image was rendered using the CyberChef tool.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350301226-TUDH7MV9TUD7MYPRQ82X/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 13. Phone’s parameters and background image sent to the C&amp;C to display in the C&amp;C interface.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350347581-K2EYS1LX2ZHU0A9E86V5/image4.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 14. Decompression of the C&amp;C command ‘Files Manager’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350447012-L2L2MSUUVWYYFYP9XVTU/image9.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 15. Decompressed data of the packet sent from the phone as a reply to the C&amp;C command ‘Files Manager’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350658331-XX6RMI5D2N5B82WPEFP8/image8.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 16. Decompressed C&amp;C command ‘Files Manager - Upload’ in the main connection between the phone and the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350714142-TISDT9LXN8TY6PP8F5MD/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 18. The data exchange between the phone and the C&amp;C. The data from the phone is red, the data from the C&amp;C is blue.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350848216-181DE3Z36YSZIDGA38CP/image12.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 19. The packets sent from the phone and the C&amp;C when doing the heartbeat.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350888496-P1INWV8P4VLE6IA3524M/image13.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 20. The ICMP messages sent from the phone to the C&amp;C every 45 seconds.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614350937998-1M5TQO68PV211JUU8099/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>Figure 21. Top connections from the phone from Wireshark -&gt; Statistics -&gt; Conversations -&gt; TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614352399991-A5K7F5UZH1BVBAW6MSE4/image2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>KAMILA BABAYEVA</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614352623428-I4MGZ4APVNGW3SFO68MU/image16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of the SpyMAX.</image:title>
      <image:caption>SEBASTIAN GARCIA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/1/22/analysis-of-droidjack-v44-rat-network-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611305950032-V7TQFAEM41Q3BXFEWEG8/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 1. A 3-way handshake started by the phone to establish TCP connection with the C&amp;C controller.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306002937-EM2FA56Y6LBTS3ROZBLL/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 2. Data sent by the C&amp;C after establishing the first TCP connection with the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306518534-2S45WYBCVQCM7O2KNOZ5/image18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 3. Data sent by the phone with initialization parameters.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306762562-2DMG7D9ECFTXT15UIBT8/Analysis+of+RAT02+pcap.+Droidjack.+-+New+frame.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 4. Bytes sent from the phone to the C&amp;C controller in one packet, including how we found the format.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306879337-2YSY2NCUV3TIQQU7BT0H/image15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 6. The heartbeat between the C&amp;C and the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306922093-UBBU7J3FRJ9FJTJ9H35U/image12.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 7. The command ‘File Voyager’ in DroidJack v4.4 C&amp;C software.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611307049326-2H47OHGY36K4LKCB7CJC/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 8. Command ‘File Voyager’ sent from the C&amp;C after the heartbeat.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611306990605-35XFTJN1A2BO19IFUFWK/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 9. The phone’s reply on the command ‘File Voyager’ sent by the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611307124786-1M01JG3DEIAOOUQDILQ4/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 10. The phone replies to the command sent by the C&amp;C in port 1337/TCP (shown in Figure 8) with data over another connection on port 1334/TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611307172091-MJ8RSCXDFOGZZB5TZ5VE/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 11. Packet sent from the phone to the controller over 1334/TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611307221312-EET8XY2BDGPYRPEUHHHW/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 12. UDP packets from the phone to the C&amp;C server sent every 20 seconds over port 1337/UDP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611308340230-2G3ISPQDH3KKOWTDCVSQ/image16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 13. Example data inside the UDP packets on port 1337/UDP sent from the phone to the controller.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611308419203-71OQ4YPX690T9DYOB129/image13.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 14. Top connections between the phone and the controller from Wireshark -&gt; Statistics -&gt; Conversations -&gt; TCP. It can be noted the long duration of the main connections.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611308467564-L34N8ANZOO8WUIO9OT7O/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 15. Behavioral model of the connection between the phone and C&amp;C over 1334/TCP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611308500989-AMX3WV4H830X7ITCYS6F/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 16. Alert from slips that it detects a C&amp;C channel over port 1334/TCP using a machine learning LSTM neural network. The LSTM uses the letters shown in Figure 15.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611308530585-BKXFXAQXGFIPXPRLSSVF/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.</image:title>
      <image:caption>Figure 17. Behavioral model created by Slips for the connection between phone and C&amp;C over 1337/UDP.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611309537250-XVDQEX8D52IVRM7SONJ4/image14.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic. - Kamila Babayeva</image:title>
      <image:caption>Kamila Babayeva is a 20 years old and third-year bachelor student in the Computer Science and Electrical Engineering program at the Czech Technical University in Prague. She is a researcher in the Civilsphere project, a project dedicated to protecting civil organizations and individuals from targeted attacks. Her research focuses on helping people and protecting their digital rights by developing free software based on machine learning. Initially, she worked as a junior Malware Reverser. Currently, Kamila leads the development of the Stratosphere Linux Intrusion Prevent System (Slips), which is used to protect the civil society in the Civilsphere lab.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1611309281926-QJ2KRSAJFSUBTE6MVH7F/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic. - Sebastian Garcia</image:title>
      <image:caption>Sebastian Garcia is a malware researcher and security teacher with experience in applied machine learning on network traffic. He founded the Stratosphere Lab, aiming to do impactful security research to help others using machine learning. He believes that free software and machine learning tools can help better protect users from abuse of our digital rights. He researches on machine learning for security, honeypots, malware traffic detection, social networks security detection, distributed scanning (dnmap), keystroke dynamics, fake news, Bluetooth analysis, privacy protection, intruder detection, and microphone detection with SDR (Salamandra). He co-founded the MatesLab hackspace in Argentina and co-founded the Independent Fund for Women in Tech. @eldracote. https://www.researchgate.net/profile/Sebastian_Garcia6</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/1/25/active-directory-honeypot-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2021/1/4/stratosphere-datasets-update-quickly-browse-and-search</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1609755260523-GEVJH7EYVWT3MYA14PE4/stratosphere-datasets-1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Stratosphere Datasets Update: Quickly Browse and Search!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/12/14/ngwqj0h060yv40w1afp51fg7wo9ijy-pzlhk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608298170360-J4YRGDXHBK7282F1G09M/image11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 1. Initial 3-way handshake from the RAT in the phone to the Command and Control server to establish a TCP connection with the controller.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608298257142-OND0X1E2CJZ49HEF5TV6/image10.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 2. Data sent by the phone in the Command and Control channel after establishing the TCP connection with the controller. At the beginning it may seem that there is no structure, but the first number 2969 may be a good indication of meaning</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608298425633-R6Y2YG67FKEP8IBUR5BY/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 3. Another example of the encoding mechanism used in a packet sent from the controller to the phone together with its format.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608298473308-PELPX18FUVLDJA5DIXQW/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 4. The bytes 1F and 8B represent the magic number header of the Gzip file signature for the DEFLATE protocol.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608299898986-MG54B0ONQKJOHKHV50LG/image7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 6. Decompression of the data sent from the infected phone to the C&amp;C controller  (without the number for data length and delimiter). The packet was decompressed using CyberChef recipe ‘From Hex’ and ‘Gunzip’.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608300073786-U4I96YAHUW1O32TW3NEC/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>﻿Figure 7. The screenshot from the controller when the phone connects to it.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608300138777-KWFVRFKHRTMBB71U7WQ2/image8.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 8. Using CyberChef to render images from Base64.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608300185503-JPGQMDRBF5AKM88447JT/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 9. Rendered background image sent from the phone to the controller.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608300232131-RVOPHXGS7H3QUIVEH7UR/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 10. Heartbeat between the controller and the phone.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608301821539-KAJJ32J8B1QU67IQY3VW/image14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 12. Length of connections between the phone and the controller from Wireshark - Statistics - Conversations. It is clear that some connections are long (+40mins)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608302043609-L5CEA3T0JW5HAZMYFFJ4/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding.</image:title>
      <image:caption>Figure 13.  The content of the output folder ‘out’ after executing the extractor on RAT01.pcap of Android Tester v6.4.6 from the Android Mischief Dataset.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608307785019-3KS9NHUPVLINJVDSRUL9/image13.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding. - Kamila Babayeva</image:title>
      <image:caption>Kamila Babayeva is a bachelor student in the Computer Science and Electrical Engineering program at the Czech Technical University in Prague. She is a researcher in the Civilsphere project, a project dedicated to protecting civil organizations and individuals from targeted attacks. Her research focuses on helping people and protecting their digital rights by developing free software based on machine learning. Currently, Kamila leads the development of the Stratosphere Linux Intrusion Prevent System (Slips), which is used to protect the civil society in the Civilsphere lab.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608308207195-2GCVCFRP6S5UZR8I03E8/image9.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding. - Lisandro Ubiedo</image:title>
      <image:caption>Lisandro Ubiedo is a malware researcher, programmer and DevOps consultant. He is a collaborator for the Aposemat Project and focuses in reverse engineering and both network and binary malware analysis.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1608302975471-A3AEZRWVOJ4WW01O10RU/image12.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dissecting a RAT. Android Tester Trojan Analysis and Decoding. - Sebastian Garcia</image:title>
      <image:caption>Sebastian Garcia is a malware researcher and security teacher with experience in applied machine learning on network traffic. He founded the Stratosphere Lab, aiming to do impactful security research to help others using machine learning. He believes that free software and machine learning tools can help better protect users from abuse of our digital rights. He researches on machine learning for security, honeypots, malware traffic detection, social networks security detection, distributed scanning (dnmap), keystroke dynamics, fake news, Bluetooth analysis, privacy protection, intruder detection, and microphone detection with SDR (Salamandra). He co-founded the MatesLab hackspace in Argentina and co-founded the Independent Fund for Women in Tech. @eldracote. https://www.researchgate.net/profile/Sebastian_Garcia6</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/12/03/deep-dive-into-an-obfuscation-as-a-service-for-android-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606903087322-PQEGK0QK1R8IZ57SELGA/image6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 1 - Registration Webpage for the Obfuscation Service</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606913194759-0PI248S21H2W6QA1R0EH/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 2 - Advertisement for the Obfuscation-as-a-Service on HackForums</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606917972875-M5DIKO92YIGX2PBAJEGX/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Table 2 - Automated Analysis Comparing Obfuscated and Non-Obfuscated APK files</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606918243952-93LG33RGHLTKYG6597DC/figure3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 3 - Amount of APK applications sent to VirusTotal and probably created with the same Obfuscation Service</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606924761552-V56VTT7PALES4UZZ030D/new-figure4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 4 - Extract of the strings.xml file from one of the Obfuscated Applications</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606921382937-QJOCYOGZW0YN8IO5KEEI/figure6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 6 - Detection Variation by Groups</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606921468649-U5AKNA6F0BVU1173AKFP/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
      <image:caption>Figure 7 - Prices for using the Obfuscation-as-a-Service</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606935410610-BIKEH9NZ8M709IIPOGUG/masarah.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606935019298-40WARRYKZKAXK9X6Y3V1/vit-small2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606935257725-E20X4YNFPTR9859E7VC8/mariajose.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606934860479-EV2955LWUD3APBI0PSF5/sebas.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Deep Dive into an Obfuscation-as-a-Service for Android Malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/11/10/android-mischief-rats-dataset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-04-25</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/11/14/installing-and-running-slips-in-docker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1605392651996-1QSU6W8GP0GC1RFIPARN/docker-images.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing and Running Slips in Docker</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1605393804616-YKLAEIO8NAGNO5KK47IH/slips-test-run-hide-and-seek.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing and Running Slips in Docker</image:title>
      <image:caption>Slips test run: ./slips.py -c slips.conf -r datasets/hide-and-seek-short.pcap</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1605393932318-CGHD8QFXYTXIU33H1YI6/slips-in-action-1</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing and Running Slips in Docker</image:title>
      <image:caption>Slips in action: ./slips.py -c slips.conf -r /opt/datasets/2016-12-12-EITest-Rig-V-sends-CryptoMix-ransomware.pcap</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1605394126401-7AZIQY6AKDBNTZ8VH77E/slips-graphical-gui-kalipso</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing and Running Slips in Docker</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/11/04/white-paper-current-state-of-ipv6-security-in-iot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1604499999197-2E5WMJNTGR6H8YP19ILI/White+Paper+Current+State+of+IPv6+Security+in+IoT.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - White Paper: Current State of IPv6 Security in IoT - Click to Download</image:title>
      <image:caption>White Paper: Current State of IPv6 Security in IoT</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/22/a-visual-display-of-etcpasswd-andetcshadow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1603347414982-SZ68WZFHL6N9LG7S5HMF/BSY+Security+Class+Diagrams+-+_etc_passwd+%28L%29.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - A visual display of /etc/passwd and/etc/shadow</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1603347459833-GSR76P31T020NK97YV4B/BSY+Security+Class+Diagrams+-+_etc_shadow+%28L%29.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - A visual display of /etc/passwd and/etc/shadow</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/16/data-exfiltration-via-ipv6</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597698270760-W1NDA9L0MJE0UPCHHB44/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Data Exfiltration via IPv6</image:title>
      <image:caption>Figure 1. OSI Model and description of its layers. Layers 3 and 4 are highlighted in light orange and yellow respectively (Source: Wikipedia)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597698330786-7MBF95GUG04SNGOT9071/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Data Exfiltration via IPv6</image:title>
      <image:caption>Figure 2. IPv6 packet header structure with Flow Label field (marked red). (Source: Wikipedia)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597699168075-XJ3S09W0QH9ETLUIZQKV/image4_80.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Data Exfiltration via IPv6</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597698506911-4ZI5TB9YWILULZEQVNSM/image1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Data Exfiltration via IPv6</image:title>
      <image:caption>Figure 3. Packets with encrypted data in the sequence field are received and decrypted.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602874728339-0277NIF4FJZTI4JDPDAW/avast-logo.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Data Exfiltration via IPv6</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/10/installing-t-pot-honeypot-framework-in-the-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340936936-NWWQSLJI5XZ4D4DNJD8C/Screenshot+2020-10-10+at+16.33.02.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602341473118-HS9Y30GFLQTQZGZ9N352/create-dropplet-0.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 1: Select the option to create a new droplet or cloud server</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340198007-K2OJDRHCART5I77QI5CQ/create-dropplet-1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 2: Select Debian 10 x64 (or the latest) as your base image.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340224115-G97AR4GHNQA5OAGVN9OJ/create-dropplet-2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 3: Select the plan and specs of the new server.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340280485-XOVFFYE81E8I7XORHA5G/create-dropplet-3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 4: Select the country where the server will be located.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340430689-CQTEGI9B0R2SSKA6LRFS/create-dropplet-4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 4: Select the authentication method: SSH Key or Password.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340471588-OKGYGXCAHW75N0X6UN7G/create-dropplet-5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 5: Select how many cloud servers to create and the hostname(s).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602340493815-RM3KJUTT22ML33YLCKTT/create-dropplet-6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 6: All ready, create droplet.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602342298902-4N0LVJ34V2S8LRSL4HSZ/create-dropplet-7.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
      <image:caption>Step 7: Your droplet is ready to install T-Pot.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602344346824-4NPN8G1PB4OXXWG2CP3Z/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602344555510-9GW6PK6Z9T1GP3VHGB6H/Screenshot+2020-10-10+at+17.41.46.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602345133077-QRXFUJ27QTWT6UN1BJGX/Screenshot+2020-10-10+at+17.51.42.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602345153795-L2QFMH7EEAB1ZLHG3RX9/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1602345954768-S22MPG6HMLPVYFFCLH00/Screenshot_2020-10-10+Honeytrap+-+Elastic.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Installing T-Pot Honeypot Framework in the Cloud</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/5/what-is-post-modern-computational-propaganda</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601909148285-I0L83YUA7743QHR6STC1/computational-propaganda-blog.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - What is Post-Modern Computational Propaganda?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601913751880-0U6FPCO9PVE84RD4EERN/avast-logo.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - What is Post-Modern Computational Propaganda?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/2/stratosphere-yara-rules-repository</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601561150195-M2FNI72J51OY1IM3V491/Screen+Shot+2020-10-01+at+08.05.16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Stratosphere YARA Rules Repository</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601624268462-0B8QGG4VLYAFQ99HEM62/Screenshot+2020-10-02+at+09.37.28.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Stratosphere YARA Rules Repository</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/10/2/cve-search-tool</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/9/29/active-scanning-for-sap-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601378601728-FEBZ7YHYHAX0RIQ0IKBB/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Active Scanning for SAP Applications</image:title>
      <image:caption>Image 1 - Distribution of hourly number of connections in June</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601378675962-Q8MNBE0CAKVSLIVYA0VB/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Active Scanning for SAP Applications</image:title>
      <image:caption>Image 2 - Distribution of hourly number of connections in July</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601381509095-48UVJ9VYWC1C7T89CD5K/image3_2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Active Scanning for SAP Applications</image:title>
      <image:caption>Image 3 - Distribution of hourly number of connections in August</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601381242774-X4G5EA16G75BZIHWL4VR/Evolution+of+TCP+scannings+on+port+50000.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Active Scanning for SAP Applications</image:title>
      <image:caption>Image 4 - Evolution of number of TCP connections on TCP port 50000 from June to August.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601381018337-D912GRASUBB7KN5RIAR7/_ECH6564_reduced.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Active Scanning for SAP Applications - Juan Pablo Perez Etchegoyen</image:title>
      <image:caption>As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world's biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/7/31/the-new-and-improved-attacker-ip-prioritizer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1596199761014-VYIBFZWUZWXZI3LL9RZI/aposemat1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - The New and Improved Attacker IP Prioritizer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1596200277251-V3Z19TH57TG9CO5IE8CY/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - The New and Improved Attacker IP Prioritizer</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/8/12/machine-learning-leaks-and-where-to-find-them</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597225720335-YIJB3HTM30H2ZRI1DG41/password-2271736_1280.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Machine Learning Leaks and Where to Find Them</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597224549001-STSBX99BFKLRIWP8RR1E/actor_assets.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Machine Learning Leaks and Where to Find Them</image:title>
      <image:caption>Figure 1. Threat model for privacy leak attacks in machine learning models. Actors, assets and actions.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597224716822-IPY0K0YLP9O3B784PBE6/heatmap3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Machine Learning Leaks and Where to Find Them</image:title>
      <image:caption>Figure 2. Amount of papers focusing on each type of attacks and learning tasks. The most attacked task is classification.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/6/8/dark-nexus-the-old-the-new-and-the-ugly</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560195244-Q75OZ1QD7ULXEN3VWM15/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560322375-IAVXHTR8HPNBFKI1KA9D/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 1. Hardcoded C&amp;C list populated to later be used by the bot.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560455106-KJ5NC8OJBBCYS2TSZSPN/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 2. Hardcoded domain name and IP address in init_syn_bruter function.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560488665-E77NXKDWW4ECJN7NGAF0/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 3. The malware spreads on multiple architectures to have a wider range of infection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560686821-9R8M3JX6WJUTJUU20M6C/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 4. IP and port reported by the bot that infected and ran the malware sample. This will later be used as a replacement for it’s C&amp;Cs if needed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560644214-L64UOA6I43E52N6OFPNA/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 5. User-Agent used by the malware is: hoho_fastflux/v5. The string “hoho” is commonly used throughout this malware.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560807139-73HJ7I3ZLIW1KZOMWXMH/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 6. Function (and process) killer is initialized along with the structure in charge of keeping track of the processes being analyzed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591560846017-WDPMFMSFQZCV8ZJHERH3/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 7. Bot recursively checks all the processes’ weight and calls kill() to terminate whoever it finds threatening for its functioning.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591561041284-P7J2OZF13FZCM2CR4NOF/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 8. Methods used by the bot to impede the system from being restored.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591561085455-NF4PZIF1F5USKJ4JB5LQ/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 9. The bot removes all permissions on specific executables so no restoration of the device is possible.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1591561263097-Y00E7GPB8PFXBET1WUUD/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Dark Nexus: the old, the new and the ugly</image:title>
      <image:caption>Figure 10. Main part of the lockdown process. This ensures no intruder or legitimate process is started as it gets killed if is not present in the lockdown PID list.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/5/5/cybersec-and-ai-connected-workshops</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588755592171-XBYO8T6IGJFALW32MZLL/AIC-logo-transparent.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - CYBERSEC &amp;amp; AI Connected Workshops: Call for Presentations</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588683460416-DTNGP64FG89BKXP0SMHF/image-asset.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - CYBERSEC &amp;amp; AI Connected Workshops: Call for Presentations</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588683356746-HB0P2TWQ8SY79WEONIQJ/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - CYBERSEC &amp;amp; AI Connected Workshops: Call for Presentations</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/4/29/rhombus-a-new-iot-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588121407241-VBGFWKVX1VO0AQG0QKWC/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 1. Twitter post of MalwareMustDie findings, sharing samples and command-and control information.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588121725363-WWO4NB1PAQUBPKJCHHXW/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 2. String obfuscation function flow graph. The bold green arrows indicate that a character by character obfuscation is being performed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588121885464-2SQM61GOTH3DPDU3VIFO/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 3. Upper array is the mutated characters list. Lower array is the original one. Both used to transform the original string to obfuscate it.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588123115210-0EK43XWVHN1AJFYH72F1/image_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 4. Malware creates a temporary file with the stage #2.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588122104893-DYQ8FYDHL7TU0TPIAKBM/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 5. Execution flow of stage #2 execution and temporary file deletion.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588122336938-S93QTGH0SRG53ILYGM0R/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 6. Malware attempts verify open Telnet ports on randomly generated IP addresses across the Internet. Gray rows are SYN packets and black are TCP out-of-order or retransmission SYN packets.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588123420296-UHOBSN1KHZQYE8PR4NH4/image_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 7. Reporting or C&amp;C server hardcoded into the stage #2 binary.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588123464912-CH23D8BPBFPDETGWJX1M/image_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
      <image:caption>Figure 8. Updating procedure. A different port but same C&amp;C IP address is used during this process.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215795973-1D68MWK4U267BY2TFQM4/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - RHOMBUS: a new IoT Malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/4/26/timeline-of-iot-malware-version-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587919801121-157XE382HCBK0DWN4WP4/Stratosphere-TimelineIoTMalware-V1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Timeline of IoT Malware - Version 1</image:title>
      <image:caption>First timeline of IoT Malware by first time seen. Data obtained by correlation of information found using OSINT techniques .</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/3/30/upcoming-april-13th-update-for-aposemat-aip-blacklists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1585585041205-2LH095R307GF8BWAINZQ/aposemat1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Upcoming April 13th Update for Aposemat AIP Blacklists</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/3/19/iot-23-in-depth-ctu-iot-malware-capture-1-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584581750641-2H9QVL9AEGID136F6QQ6/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 1. Obfuscated data found in the binary and later decrypted when it’s going to be used.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584581869648-AZFB8JDELGPJTOA407U2/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 2. Function that obfuscates and deobfuscates the strings during execution used by the Hide-and-seek malware.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584581942635-550CNI7ZRG1FJRI7OK3B/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 3. Data from Figure 1 deobfuscated by imitating the obfuscation function.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582188785-SR0Y6A1PV0SBPZOW0L6S/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 4. Malware checks for other malware variants running in the infected device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582326740-CL3NKQEZFT7A1C9OILD1/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 5. Measures taken after execution by the malware in order to run uninterrupted.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582419223-ITABAA0H8YPP7E4HSDN3/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582453860-GPL978PNYXHPZASHHNKC/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582494945-O9201PG90D32GSIZ2XF3/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 6. Malware executes the command iptables to add an acceptance rule for its listening UDP port.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582591283-RL5VN919WEBWINKAH2H7/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 7. Core procedures taken from the main function after the UDP socket is created.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582710909-FFDIFX0WQE6MTSUOKTCT/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582794480-IOJF81LX0EFLH38A4F14/image2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 8. Similarities between the killer function in the original Mirai source code and Hide N’ Seek’s decompiled function. Also, functions like util_strcpy and util_strlen were also copied.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584582931271-35R1SVKYET344KVNIXI0/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 9. If any data is received from the UDP socket initialized for the custom P2P communication it will be processed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584583065180-AX94ZUE53FEI7QWRRKDF/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 10. First packet of the capture is a peer search from the malware to reach another possibly infected device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584583170432-41PZ2IJWVA8IUF5W3S7F/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 11. Ports in their hexadecimal and decimal form are hardcoded in the binary, part of the scanning function.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584583257120-D9J12X8ZQVL5OPASY6J1/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
      <image:caption>Figure 12. While scanning the internet for vulnerable devices using the HTTP protocol the malware will process the response and search for strings to make sure it is vulnerable before attacking.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215692805-S6M8YMS25M6HRXF5EVL5/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-1-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/3/16/cyber-cidersecuritycon-conference-wrap-up</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584269771946-AWCH5G43MITMZ5EBJLI0/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - [Cyber] CiderSecurityCon Conference Wrap Up</image:title>
      <image:caption>Veronica presenting about Machete APT malware and how it operated since 2010.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584285317433-JNUUQBX582Y8Q6CEW7IX/Screenshot+2020-03-15+at+16.14.16.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - [Cyber] CiderSecurityCon Conference Wrap Up</image:title>
      <image:caption>Stefan showing a physical security bypassing technique.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1584288364357-B08A4LZ14XP1LKRY2QQV/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - [Cyber] CiderSecurityCon Conference Wrap Up</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/3/9/iot-23-in-depth-ctu-iot-malware-capture-60-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503509554-D4AB1DX6OPWVVCOPYZ9Q/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 1. Information about the device is collected and sent to the C&amp;C. This information is collected, mostly, using shell commands.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503600614-3EJIR0CBG2NJY5B5HQKS/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 2. The UPDATE command downloads a new shell script to update the malware binary.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503728165-VT79N5YJNODQK2F545CQ/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 3. Once connected to a telnet service it will execute a shell script to drop new malware. IP 51.254.145.97 is now defunct and not working.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503918262-057Y957WEP10LFUZRJY1/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503990974-P8XZVYNAVLRFM7JPBCJC/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 4. Maintenance functions are run by the malware to ensure its existence in the device. First it will set DNSs to ensure proper hostname resolution and then clean its presence and environment.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583522090223-7QLQ62RLYJ8XK62SU99S/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 5. Unknown commands are sent to the malware by the C&amp;C.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583522169435-4WNSP6O72Z3C9P4EPCCP/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 6. Active communication between the C&amp;C and the malware. It starts executing attacks against different IPs using different network protocols.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583523116415-RUL9ABM45I8XDWJSZGCL/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
      <image:caption>Figure 7. UDP packets send in one of the STD flooding attacks. Length is always the same but data changes randomly.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215611129-702PJRWB6Z6ZMORZ9PFZ/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-60-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/3/6/swiss-cyber-security-days-conference-wrap-up</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583503028400-1N6802OI8Z76VPBQ89XC/84697729_759987634407443_4417169393427939328_o.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Swiss Cyber Security Days: Conference Wrap-Up</image:title>
      <image:caption>María José Erquiaga presenting “The Truth is out there: Hunting malware from an IoT laboratory”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583845404322-67FRRFX2ZD4JYG63BACS/84681659_760128507726689_3407875439195062272_o.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Swiss Cyber Security Days: Conference Wrap-Up</image:title>
      <image:caption>Yamila Levalle presenting “Bypassing biometric security controls with 3D printing”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583845856365-TU7YTAVIIWQZBLTBCELJ/84750710_760128644393342_2850658932106461184_o.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Swiss Cyber Security Days: Conference Wrap-Up</image:title>
      <image:caption>Salvador Mendoza talking about Payment Systems</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583845997405-EV19LAMFU4X5WUC4UZC7/86462543_759988031074070_7623974293688287232_o.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Swiss Cyber Security Days: Conference Wrap-Up</image:title>
      <image:caption>Nahuel Grisolia presenting “A journey to the problems on federated authentication and secrets sharing”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1583846438178-9DMV5I4X5M78F1SGDQOO/85192134_760665754339631_6518685745920606208_o.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Swiss Cyber Security Days: Conference Wrap-Up</image:title>
      <image:caption>The Wizz presenting the BOTing side of life</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/2/24/iot-23-in-depth-ctu-iot-malware-capture-8-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582606406916-JGIZRLGRVO4KNAZX8TGL/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582606567030-H3N1HLDJKOD25F7M5D7O/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 1. Check which SSH server name to use and impersonate the process using prct(). The creator could use Python’s presence on the device to identify which OS is being used.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582606957939-BX54W952XVTON9MGGPE0/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 2. After imitating the toggle_obj() function the C&amp;C server information can be decrypted.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582607423299-CL60P1GZZR6WPGXMNEOR/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 3. Usernames and passwords used during the telnet scanning and brute force process. These were deobfuscated using the process previously detailed.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582608399287-QSSOMNBRG81G0JZHED4P/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 4. Command and Control port and IP address, both hardcoded into the binary.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582608687439-HAO26BGXQPHBEHKR2CU5/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 5. If command “SC” is toggled ON it will call the functions exploit_worker() and scanner_init(). This will start the exploitation and brute force process.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582609001057-OSHCTLJIK11NW4V5FKQJ/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 6. For each exploit an IP address is generated and the exploit is sent to that address. This way the malware will keep infecting vulnerable devices.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582608967058-HEV3S5V1DL10IEBH6DRK/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1582641329763-1AZC0Q09OP7NV8UXZVHV/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
      <image:caption>Figure 7. Overall, 12334 packets were sent by the malware to the C&amp;C. Half of those were sent to a different, and probably wrong, IP address.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215526598-URF87F4SYSZ7OSY7JD9W/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-8-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/2/14/iot-23-in-depth-ctu-iot-malware-capture-3-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581700747626-IQORSUJBK59H1X5VIUZB/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 1. This Muhstik sample has embedded a phrase taken from the anime Bakemonogatari.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581700996400-MBQLQ5Q4F6588BJ1VFL0/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 2. UPX magic number being restored using radare2. Any hex editor is suitable for this type of edition.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581701186867-OUDMOT61T3ODDOATGH79/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 3. After fixing the Muhstik binary the upx tool is able to parse the binary and the unpacking is possible.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581701296287-SSRP1Z3T7TFTABD1V5DP/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 4. IRC commands available in this Muhstik bot to be executed by the botmaster. This is the available command list sent to the botmaster via the HELP command.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581701358261-P0D13VXRBINPQDAMZAJP/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 5. The Muhstik malware creates crontab entries to persist in the device. In this case, the malware will be executed every 5 minutes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581701999347-HPFSYBII9M52QXW5DG3O/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 6. Files read by the malware while constructing the NICK. This unique nickname is used by the C&amp;C to identify unique instances.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581702079634-G2H0XJ53ORPJGLOT8Q27/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 7. List of default usernames and passwords to be used by the SSH brute force attack. Some of these range from default cloud passwords to common passwords used by end users.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581702330602-XFJ69GPG60H19JVK2S04/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 8. Code executed after a successful SSH connection to another instance. This is executed using the HTTP URL and TFTP host provided to the IRC command by the C&amp;C admin.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581702685447-0SFXRA441TVO2VON8YHW/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 9. Conversation statistics between the infected device and the C&amp;C servers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581704198918-7J96LESGBPRAMRWSE7V3/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 10. Steps taken by then bot and command sent from the C&amp;C. All IRC sessions have this same structure.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581704899346-0917EFC3TUU3XEHO3KIB/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
      <image:caption>Figure 11. The IRC C&amp;C server was full and the bot wasn’t able to connect.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215439134-TU17EMPENG1VLVXGODSQ/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-3-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/02/13/zeek-new-irc-feature-extractor-package</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580916327621-G47WKMQLEXUWIZG7TGS2/zkg-logo.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Zeek: New IRC Feature Extractor Package</image:title>
      <image:caption>.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580913974416-CVWF8YRT70EV4KSYKOBG/irc_connection.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Zeek: New IRC Feature Extractor Package</image:title>
      <image:caption>Figure 1. Example of IRC connection that is defined by source IP address 192.168.0.1, destination IP address 192.168.0.2, and destination port 440. Source port is neglected, and therefore one IRC connection can have multiple source ports. The IP addresses and ports were randomly chosen for demonstration purposes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581601805352-SVJHCMRTO6QRX056NUO4/periodicity_sketch.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Zeek: New IRC Feature Extractor Package</image:title>
      <image:caption>Figure 2. Illustration of how message periodicity is computed. The time differences between messages and FFT output numbers are chosen randomly for demonstration purposes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580915492749-O7VLXT2RZ0NL2Q240SSG/formula_entropy.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Zeek: New IRC Feature Extractor Package</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580916548567-GJ62RSG3HDBHZD0BSDKE/irc-rgx.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Zeek: New IRC Feature Extractor Package</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/2/3/iot-23-in-depth-ctu-iot-malware-capture-9-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580756437183-FDBL0U7HP3Z9BYURPNDB/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 1. Strings coming from DHT’s source code and torrent port.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580756822410-N6JU20XAT52NQ54J9VRF/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 2. NTP host and port to be used by the malware.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580756935968-RES6T55D7TQ1P0YV6YQD/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 3. Request code 0x80045704 is issued via ioctl() to disable the kernel watchdog.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580756995386-4AROIF9J3K65Z4PFKNO5/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 4. Ports hardcoded in the binary and used in firewall rules to block incoming connections.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580757045299-L6MFDSE8P61D6RBAG1U5/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 5. Ports being blocked via iptables and actions taken by the malware to protect the device from further or previous exploitation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580757393412-7RYGV5L7HFJFDA3SZAB2/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 6. Malware will figure as telnetd when reading the process list.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580757905703-6WVKAZ3XAX4G8N7RF9DJ/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 7. Node response to malware DHT ping query.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580758085752-DJCQG1N5I3G4UMXVE619/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 8. Node list result of the infohash search by malware.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580758229083-SX5YQL7QE6PA6RMTKCB1/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 9. announce_peer query specifying the torrent’s info_hash and port to be used during the download.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580758435668-O8OMO5NTSK39XZP3YRAE/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 10. Overall network statistics of the complete traffic capture of Scenario 18.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580758560410-4QKCU79HIAYC64SZG2MJ/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 11. The attack to port 81/TCP starts right after the last uTP packet is delivered.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580758700753-5300V65CW6W0653QTOTS/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 12. MikroTik device compromised by the executed malware over Telnet.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580759208995-1N6V26PPQ3ZPSRXH4GPF/image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
      <image:caption>Figure 13. The image shows the device being attacked mid-infection. Multiple IPs bruteforcing credentials via Telnet while the malware was logged into the device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589215312076-51KQDQG6BXDJVLOZ05LH/logo-avast.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT-23 In Depth: CTU-IoT-Malware-Capture-9-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/1/31/writing-a-slips-module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/1/22/aposemat-iot-23-a-labeled-dataset-with-malicious-and-benign-iot-network-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579696005489-PB1NCQ6SCC4ZPYMCLFLR/IOT23.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579693825961-KO6ZIU3F6697PCFIMNER/IMG_3452.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Image 1 - Early set up where the malware executions took place.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579633202246-ID0HXDJ7FKABJNCJ7XBK/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Image 2: Amazon Echo device</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579633291027-IJGWXH9DN5FOGTMXN2Y6/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Image 3: Somfy Smart Door Lock device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579633249512-MFFVV85HUF28EE6SNJQI/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Image 4: Philips Hue device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579642900562-L9I4GVSXSZFF2GMIN8A9/18-40-55-image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Table 1: Summary of the Malicious IoT Scenarios</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579643032781-W3KBEEA7XQM9R3KXY1B3/18-43-16-image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Table 2: Breakdown of Application Layer Protocols as detected by Zeek on the Malicious Scenarios</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579643142546-2X45BTHBF6DLNRVTI24F/Screenshot_20200121_174227.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Table 3: Summary of the Benign scenarios.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579643198498-FG0QSHQ5QQR0JIIWA71E/Screenshot_20200121_174544.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Table 4: Breakdown of Application Layer Protocols as detected by Zeek on the Benign Scenarios.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579643740646-7R5TZNV9COJ7ZU3P9QLK/18-54-31-image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
      <image:caption>Table 6: Labels distribution of all IoT-23 labeled flows in log scale.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620231132564-E585HMF07KECOL2VV4QO/avast-logo.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT-23: A Labeled Dataset With Malicious And Benign IoT Network Traffic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2020/1/1/aposemat-iot-honeypots-2019-in-review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-01-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892266458-CKGWYAC1MR0H66RLRIH8/Screenshot+2020-01-01+at+15.32.59.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
      <image:caption>Our IoT honeypots were attacked from all over the world. This map shows where the attacks originated from.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892291153-AE90IZ90KUHLR4TQ08FJ/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
      <image:caption>Our monitoring shows that out of the 14M attacks, 10M were successful connections to our honeypots.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892305986-SQIPSGUZ9BZ8P6VYEOIA/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
      <image:caption>Most of the attacks seen nowadays are automated, this is reflected in the duration of connections and data transfer.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892355327-39KAB61TVSCIS8KZ5BPO/Screenshot%2B2020-01-01%2Bat%2B15.57.21.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
      <image:caption>Top attacking countries in 2019.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892407703-T9ZVOQQIFDQW9DZ9VLHR/image-asset.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
      <image:caption>The list of attacking IPs. All connections (left) and only established connections (right).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577892426673-UQ941KCI7M94NUAAISFZ/Screenshot+2020-01-01+at+16.06.06.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1577893978709-85TBC81DFAE8OAWNMAFC/Screenshot+2020-01-01+at+16.51.06.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Honeypots: 2019 In Review</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/introducing-kalipso-the-gui-of-slips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-05-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576501541579-R79HNXV7RREUE7WVTSPJ/image3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Redis as the interaction between Slips and Kalipso. Redis structures used in Slips.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576516406615-EEZ9WXVBVSCKDTYT2XNR/image1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 1: The initial state of Kalipso. The widget profile tree is filled with the profiles.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576516472971-8DF2T8ZIMJ6HKS9GOHRA/image4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure2 : The timeline of the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576516607654-J26OVRVLIOSS70SR3LEL/tree_timewindow1_gif.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 3: The timeline for the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576516687339-LUN6T1DV0OLGZFUFCUNJ/timeline.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 4: The timeline for the time window 1 in the profile of IP 172.16.2.197 and information about destination IP addresses in the upper widget.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576516964495-YRJMH0G9CF50M43PAQ7K/dns_ips.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 5. The timeline with DNS request and replies for the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576517422084-KXYS0OMC8IN1ETQUUNLA/dns.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 6. The timeline with DNS requests for the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576518253513-20KIDM0XKL2XV1AHN5IC/image5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 7. The map of geolocations of all the destinations IP addresses from the timeline for the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576519573187-MUESXWVAHUJMPFLIHIKW/outtuple.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Introducing Kalipso: the new interactive GUI of the Stratosphere Linux IPS</image:title>
      <image:caption>Figure 7. Table with Out Tuples from the timeline for the time window 1 in the profile of IP 172.16.2.197.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/11/5/attacker-ip-prioritizer-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1573203072942-4T25ZA3SKLAYBJKBLCMH/Screenshot_2019-11-08+AIP-Program+Splunk+7+2+6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Attacker IP Prioritizer Program</image:title>
      <image:caption>Figure 1: The output of the Splunk sorting function</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1573734582953-W9CPGDIJVHMMIQMHORVV/CodeCogsEqn.gif</image:loc>
      <image:title>Stratosphere IPS Research Blog - Attacker IP Prioritizer Program</image:title>
      <image:caption>Figure 2: Score Function</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1572947960688-39UG1U061MZGMBYWMIN2/Screenshot_2019-10-17+plot+1+-+%28x+%28x+%2B+30%29%29+from+0+to+60+-+Wolfram+Alpha.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Attacker IP Prioritizer Program</image:title>
      <image:caption>the x-axis is the percentage of the original score, y-axis is days</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1572947994495-19UUNHN10W3DGGSFAB53/Screenshot_2019-10-17+plot+x%5E%281+2%29+from+0+to+100+-+Wolfram+Alpha.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Attacker IP Prioritizer Program</image:title>
      <image:caption>x-axis is score, y-axis is days</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/10/17/notes-from-the-lab-sudden-increase-of-traffic-to-port-445</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-10-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571312523561-2B1J98YCIXMQ9IM3AZD2/Screenshot+2019-10-17+at+13.41.49.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571314292936-IYWBM02QOYBS7F2OFVDZ/Screenshot+2019-10-17+at+14.08.40.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 2 - Number of connections to our SMB Honeypot (1 device) from June 1st to October 1st. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571314928189-48DA3OVY1SVPCJYBKAIX/Screenshot+2019-10-17+at+14.21.46.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 3 - Number of attacking IPs to our SMB Honeypot (1 device) from June 1st to October 1st. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571318751631-3QANU9ZAO9N21WH5IC6X/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 4: The number of connections spiked to more than 50000 on October 15th. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571319172275-EI5HAC9G59I1HJA944L0/Screenshot+2019-10-17+at+15.27.02.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 5 - The number of attacking IPs to the SMB Honeypot (1 device) during the days of the spike raised but not considerably. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571320549657-30MCDJN0JJFI20XS4IGI/Screenshot+2019-10-17+at+15.53.00.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 6 - Number of connections per attacking IP in the last 7 days. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571320559233-3KA6LT9XUAOV5I3TIK3D/Screenshot+2019-10-17+at+15.53.50.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 7 - Number of connections per attacking IP in the last 30 days. Source: Aposemat Project.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571322924318-UYCO001GHBQMQ3VYXOSN/Screenshot+2019-10-17+at+16.33.45.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Notes From The Lab: Sudden Increase of Traffic to Port 445</image:title>
      <image:caption>Figure 8 - Geolocation map of the attacking IPs listed above. Source: Aposemat Project.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/10/13/paper-a-study-of-machete-cyber-espionage-operations-in-latin-america</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-10-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1567329778791-5XDY7JGX31V6DI5TGN55/VB2019-London-withdate-325w.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Paper: A Study of Machete Cyber Espionage Operations in Latin America</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1567350456862-3JS7EQUPGTWN9SL7AW1M/Screenshot+2019-09-01+at+17.06.52.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Paper: A Study of Machete Cyber Espionage Operations in Latin America</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1570980225535-I55I1A53X6519WBK0BMJ/IMG_1558.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - Paper: A Study of Machete Cyber Espionage Operations in Latin America</image:title>
      <image:caption>Veronica Valeros (left) and Maria Rigaki (right) presenting the research on Machete at the Virus Bulletin Conference in London.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/10/8/hexa-payload-decoder-tool</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-10-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1570456542650-R4DM5SB5MA5H6YC8DXKB/Hexa+Payload+Decoder+-+1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Hexa Payload Decoder Tool: A Tool To Automatically Extract and Decode Hex Data in C&amp;amp;C Servers</image:title>
      <image:caption>The Hexa Payload Decoder tool is able to process a pcap file and output any identified encoded strings, decoded and translated to English.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1570457214460-JEDBP3QSLSM1DYK46AZ7/Hexa+Payload+Decoder+-+2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Hexa Payload Decoder Tool: A Tool To Automatically Extract and Decode Hex Data in C&amp;amp;C Servers</image:title>
      <image:caption>Figure 2: Suspicious data finding at Mirai port 4441 in Wireshark and its TCP Stream. The decoded hexadecimal payload cant be read with Wireshark.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1570457231804-BFK6OA7VT6KME6UU3O9X/Hexa+Payload+Decoder+-+3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Hexa Payload Decoder Tool: A Tool To Automatically Extract and Decode Hex Data in C&amp;amp;C Servers</image:title>
      <image:caption>Figure 3: Running the Hexadecimal Decoding and Translating tool with the suspicious port 4441 TCP Stream pcap file.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1570457249479-7R5PEHIZG2YY4KART6BZ/Hexa+Payload+Decoder+-+4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Hexa Payload Decoder Tool: A Tool To Automatically Extract and Decode Hex Data in C&amp;amp;C Servers</image:title>
      <image:caption>Figure 4: Checking the results of the analysis done. The word user in Russian can be seen after the decoding and translating process.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/9/20/upcoming-talk-geost-botnet-the-discovery-story-of-a-new-android-banking-trojan-from-an-opsec-error</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1568995780602-ECLCQ6AK6IUJFUWL8U9D/Screen+Shot+2019-09-20+at+13.08.00.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Upcoming Talk: Geost botnet. The discovery story of a new Android banking trojan from an OpSec error</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1568995740403-PDXSVCUURXAX4M0PB6BY/Screen+Shot+2019-09-20+at+13.08.18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Upcoming Talk: Geost botnet. The discovery story of a new Android banking trojan from an OpSec error</image:title>
      <image:caption>Geost botnet</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/9/2/upcoming-talk-a-study-of-machete-cyber-espionage-operations-in-latin-america</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-09-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1567329778791-5XDY7JGX31V6DI5TGN55/VB2019-London-withdate-325w.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Upcoming Talk: A Study of Machete Cyber Espionage Operations in Latin America</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1567350456862-3JS7EQUPGTWN9SL7AW1M/Screenshot+2019-09-01+at+17.06.52.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Upcoming Talk: A Study of Machete Cyber Espionage Operations in Latin America</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/8/11/defcon-2019-beyond-sandboxes-how-to-execute-iot-malware-and-analyze-its-evolution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1565882728136-GQLQWN9D7MOBLUOWUXVR/EBtVzdwXkAAswnB.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - DEFCON 2019. Beyond Sandboxes. How to Execute IoT Malware and Analyze its Evolution</image:title>
      <image:caption>Packet Hacking Village at Defcon 2019</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1565882875691-IRPJKUMKD9SBSKSJ6E25/download.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - DEFCON 2019. Beyond Sandboxes. How to Execute IoT Malware and Analyze its Evolution</image:title>
      <image:caption>Our talk in the Packet Hacking Village banner</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1565882626096-5DLTLR440E5F42H05KUU/Screen+Shot+2019-08-15+at+17.10.30.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - DEFCON 2019. Beyond Sandboxes. How to Execute IoT Malware and Analyze its Evolution</image:title>
      <image:caption>Defcon 2019</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1565882827521-72OELNX3RJI1PUSEWBUW/IMG_20190808_173407366.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - DEFCON 2019. Beyond Sandboxes. How to Execute IoT Malware and Analyze its Evolution</image:title>
      <image:caption>Entrance to the conference at Paris hotel</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/8/15/project-ludus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1562941184524-U80C9VSR0NXM8QTJ8J18/ludus_workflow.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Project Ludus - Smart Honeypot Manager for Collaborative Defense</image:title>
      <image:caption>Ludus overview</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1562940888222-X1D77SDB0631XINZQHDT/ludus_dashboard1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Project Ludus - Smart Honeypot Manager for Collaborative Defense</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1562940915019-6NMWAYNFH15NC7FRGTPI/ludus_dashboard2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Project Ludus - Smart Honeypot Manager for Collaborative Defense</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1562941409144-VD5MJDLUNJWJ7UZEDJRI/kibana_dashboard.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Project Ludus - Smart Honeypot Manager for Collaborative Defense</image:title>
      <image:caption>Example of public dashboard in Kibana</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/8/6/iot-honeypot-traffic-analysis-series-analysis-of-edimax-ic-7113w-part-4</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563868734433-L71O17YRPP8BN1ZT6PWP/Screenshot+2019-07-23+at+09.58.25.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563869337244-SGWQZ3UP58AQ1PONNG0S/Screenshot+2019-07-23+at+10.07.44.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563869708085-FTXB0SDJN6NVVDY2306C/Screenshot+2019-07-23+at+10.14.45.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563870132399-E8BFR4JYRZWKQBSW1H3F/Screenshot+2019-07-23+at+10.16.50+copy.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563870371616-E2P78ZSOSXIBSAMV651B/Screenshot+2019-07-23+at+10.25.31.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563871005770-ZLZ7UDVKQXPV3Y9ATEFN/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563871239421-PNDF8MI1U8XC4EWLMU85/Screenshot+2019-07-23+at+10.39.45.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563872408861-HH7VDTYOW5C29Q5FZNH5/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1563872625018-I6Q903P1YNWYMQHE4BB6/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 4</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/7/10/amparo-certunlp-workshop</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1560346589141-8XS98WAOFE39K0AQHXG4/fotoapertura2.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Summary of the Amparo-CERTUNLP Workshop in Neuquén, Argentina</image:title>
      <image:caption>Alejandra Di Croco (Secretary of Modernization of the Neuquén Government, Graciela Martinez (WARP Coordinator - LACNIC), Nicolás Macia ( CERTUNLP Coordinator), Paula Venosa (CERTUNLP Coordinator)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1560346576704-U8U6KY2N67C3FU9VJPE2/fotospublico.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Summary of the Amparo-CERTUNLP Workshop in Neuquén, Argentina</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1560345669186-3S992W2BDYFEUXNJ5C4M/fotocierre.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Summary of the Amparo-CERTUNLP Workshop in Neuquén, Argentina</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/6/12/first-workshop-on-attackers-and-cyber-crime-operations-wacco-2019</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-06-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1560340665081-95IHA3RKVWSBWZL5I1O8/Screenshot+2019-06-12+at+13.55.00.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - First Workshop on Attackers and Cyber-Crime Operations (WACCO) 2019</image:title>
      <image:caption>Paper sessions at WACCO are organized by topics: cybercrime measurements, cybercrime operations, and offenders and their ecosystem.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1561384960388-CVRZRGQ1DV9G3NZ51P1Y/Screenshot%2B2019-06-24%2Bat%2B15.58.47.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - First Workshop on Attackers and Cyber-Crime Operations (WACCO) 2019</image:title>
      <image:caption>Sebastian Garcia, Anna Shirokova, and Maria Jose Erquiaga presenting their poster on “Geost: Operational Security Failures of a New Android Banking Threat”.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1561384939158-RXUS7FW365R27JGNVO1S/Wacco.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - First Workshop on Attackers and Cyber-Crime Operations (WACCO) 2019</image:title>
      <image:caption>Veronica Valeros presenting the paper “Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America”.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/6/2/getting-started-to-splunk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559479831810-6RCHN24UW3ZMCRVVXRZY/splunk.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
      <image:caption>Overview of Splunk data ingestion capabilities and core functionality. Source: https://www.edureka.co/blog/splunk-tutorial</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559480804045-55AH98G00KTER0TBR1RL/splunk-1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
      <image:caption>Search &amp; Reporting view in the newly created Splunk instance. The basics elements highlighted in the image are: 1. Main menu to administer the instance, 2. Search bar, 3. Time range picker, and 4. Search mode menu. A more detailed and granular explanation can be found in Splunk Docs [2].</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559482747103-PM3CYVUD2WQ55CZLR118/splunk-2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
      <image:caption>Splunk is able to interpret a wide variety of data formats. In this case, the file 2018-05-03_win11.binetflow is being uploaded and the Source type is specified manually as CSV. The columns are then recognized and parsed automatically.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559483901875-R3KOS0AKYYHCJL9M3KM9/splunk-3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
      <image:caption>Search &amp; Reporting view after the data was successfully uploaded and the fields were configured.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559485091066-JZSVKEWFFUPJLNCEVNYC/splunk-4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559485435998-I7CTC6PE5Q4X1YEFLK9K/splunk-5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559485628142-AZ5JDTK3N5J56E1CMY42/splunk-6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1559486157861-QE6Z42YWQBCVZSY3IC2L/splunk-6.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - Getting Started With Splunk: Basic Searching &amp;amp; Data Viz</image:title>
      <image:caption>A monitoring dashboard created for one of the IoT honeypots of the Stratosphere Aposemat Project.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/5/29/iot-honeypot-traffic-analysis-series-analysis-of-edimax-ic-7113w-part-3-kee57</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156853355-7MN00PB1SNXMQ56RMQBU/Screen+Shot+2019-05-06+at+17.28.14.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557155636040-GCVYGZ7S8EOUQDVIFCXP/02.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557155855890-3D2NGPK61B682J9MXJRM/09.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156812861-ZGOA4G5376GAZ8PJWCT6/Screen+Shot+2019-05-06+at+17.28.31.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156035939-5I3FV5T2P3QH8LK6Z3LI/04.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156088973-Q2B6VX6A2580Q3EOXDQF/05.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156139722-NBGM1IDR3KOG9QQFEMQ4/06.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156160726-243KG88DEBG87L9GY12Z/07.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156834148-RDPXMVEGGJBEYY007JVN/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557156460527-4O2UYMOYF3TXTH8JROW7/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W, part 3</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/5/26/owasp-cz-2019-conference-wrap-up</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558865752160-9H0DDQWRLX6OXWQ2JKXV/workshop-morning-vero-sebas.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - OWASP CZ 2019: Conference Wrap-Up</image:title>
      <image:caption>Sebastian Garcia and Veronica Valeros giving the workshop ‘Getting Your Hands Dirty: IoT Botnet Analysis’ at OWASP Czech Chapter Meeting, May 2019.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558865676461-SCY3YSKHRZ34NDJPBESL/IMG_1259-1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - OWASP CZ 2019: Conference Wrap-Up</image:title>
      <image:caption>Simona Musilova and Sebastian Garcia presenting “Does Your IoT expose You? Honeypots, Attacks and Decryption in an Edimax Camera” at OWASP Czech Chapter Meeting, May 2019.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558866690443-A5OVEX34ELPCZJ0S49FW/IMG_1276-1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - OWASP CZ 2019: Conference Wrap-Up</image:title>
      <image:caption>Jan Fajfer and Kamila Babayeva presenting “We Know Where You Are: How Most Mobile Applications Jeopardize Your Security“ at OWASP Czech Chapter Meeting, May 2019.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558867756770-38Z375JYLQ7F2WG1BXIG/IMG_1281.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - OWASP CZ 2019: Conference Wrap-Up</image:title>
      <image:caption>Anna Shirokova and Sebastian Garcia presenting “Cybercriminal Activities Managing a New Android Botnet” at OWASP Czech Chapter Meeting, May 2019.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/3/21/malware-capture-analysis-possible-coin-miner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1557528202630-A9ZRS941WVD3B702QJKO/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Aposemat IoT Malware Analysis, an X-Bash infection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/5/17/iot-malware-analysis-series-a-mirai-variant-in-ctu-iot-malware-capture-49-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558099931743-4B18O7IBX37D0VDFR9AD/blob.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558101059703-62JAP17XB2OJBOKS122W/Screenshot+2019-05-17+at+15.50.46.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558104168360-T04KK3C9YKLSAV7LUK5M/blob.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558106576038-T12H0PC0E83FAN1MO924/image.jpg.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558106636318-7HP6DKGTDHDVXY5BXWYZ/image.jpg2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558106530978-II79W6JBL8ZVTOVOOVVX/blob.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558333757018-44YFU55KX6Q1JAG5LPO0/avast-logo.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Malware Analysis Series. An IoT malware dropper with custom C&amp;amp;C channel exploiting HNAP</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1556298943172-OYYU05JOED70WOT6031G/Screenshot+2019-04-20+at+21.09.08.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis of an IRC based Botnet</image:title>
      <image:caption>IRC Packet reporting TCP Flood Against 66.67.61.168</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1566495377223-1C3YKCAEJUAPDLACCTQN/Screen+Shot+2019-08-22+at+14.33.15.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis of an IRC based Botnet</image:title>
      <image:caption>Conversation between the botmasters</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1556305098712-KFTM9KF1JL5YKWMG6BIE/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Analysis of an IRC based Botnet</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/2/15/iot-honeypot-traffic-analysis-series</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550244306685-XSGU4JGOO6KR1FOA2DCR/zgrab.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550244462701-NB43Y6MK9D63VE8OQH77/gpon.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550244563621-TWTO3R7CAFQ2SAHCERBZ/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550246321433-UGE2P1TZZKEVLPPJMUT0/mpa.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550244715530-G53L0WTI5WUT2ODX3VKW/mpa-win-server.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550245057808-2HLC7DCVZ340OGZR5GTW/cname.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550489606786-SQUCQ96YVWUXK7KL04B0/normal1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550489632548-Q4VPA92098YV7ZTVACN9/normal2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550489678796-X3Z9OHIWTO7HXUGTQAGY/normal3.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550245246198-LAT7GY1B05AHIA0CNPLU/normal4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550245475226-TVRQ2AYHPXBLWS1HAOGP/normal5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550245492028-PJ90HHW1JGSICOQC0S4U/normal6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550245867515-U8V7X39YCX8DFQ4IYLMG/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Continuation Analysis of Honeypot Camera Traffic Edimax IC-7113W</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/2/17/what-do-we-know-about-quasar-rat-a-review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550402226663-2NXIELKMO7SF0M5TKXGH/quasar-1-credit-to-n0where-net.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about Quasar RAT? A review.</image:title>
      <image:caption>Quasar RAT UI showing a list of infected victims, and some of the capabilities of the RAT. Credits: https://n0where.net/free-open-source-remote-administration-tool-for-windows-quasarrat</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550414643689-95FV4E8JIH1A1WKEURPP/quasar-rat-code-activity.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about Quasar RAT? A review.</image:title>
      <image:caption>Code Frequency Quasar RAT since its origin in 2014. Source: https://github.com/quasar/QuasarRAT/</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550422375966-YYIXBS5GRZUDHIOAG34A/Screenshot+2019-02-17+at+17.51.58.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about Quasar RAT? A review.</image:title>
      <image:caption>A fork [23] from Quasar RAT is accepting donations to help the project move forward. Source: https://www.blockchain.com/btc/address/17eAafhEYnxmnj2nQ92tDFdDzATL27gcj</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550421732211-49THTKBGCHHXQ69T0L29/quasar-traffic.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about Quasar RAT? A review.</image:title>
      <image:caption>Network traffic excerpt from the US CERT report [16]. “Quasar uses the first 4 bytes of the TCP payload to track the payload’s total size in little-endian format.”, and this can be used to identify Quasar in the network. Source: https://www.us-cert.gov/ncas/analysis-reports/AR18-352A</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2019/2/6/iot-honeypot-traffic-analysis-series-analysis-of-edimax-ic-7113w-capture-ctu-honeypot-2-155</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549457683268-2I775K80KDFFMOV0VWVN/pasted+image+0.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458455431-RE8OG7GLYKZS1IYIVZPD/02.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458477155-884JTZBFLRFWFRUBID6B/03.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458496263-7WTBFPQU4DMN32EJWTJM/04.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458511804-5DK8R4301K5C4CIXSY77/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458533604-BIN499RJ4TH23637XTNL/06.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458729319-73IZ3FTPFU9IW058NYX4/07.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549458600200-DMPJJG0ZMO47KT1A6RL9/08.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549459057592-D0H7TDGN0W0IO7J55ZR5/Screenshot+2019-02-06+at+11.30.18.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549459105934-JOAYOVG8Q76U7F95FOMY/Screenshot+2019-02-06+at+11.14.47.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1549459129925-8CYVVVNN6I9WRQH88J9V/Screenshot+2019-02-06+at+13.04.45.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1550050862450-U7S78T53C9SUYJ3Q7ID8/avast_logo_small.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - IoT Honeypot Traffic Analysis Series. Analysis of Edimax IC-7113W</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/11/19/blackhoodie-bootcamp-4-wrap-up-berlin-2018</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1542633821926-1AT3QZG638QIYOQ7LAUJ/image1.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - BlackHoodie Bootcamp #4 Wrap Up - Berlin 2018</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1542654768952-8WO1QW7QDNW0TN7FD1Z3/Screenshot+2018-11-19+at+20.12.31.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - BlackHoodie Bootcamp #4 Wrap Up - Berlin 2018</image:title>
      <image:caption>BlackHoodie 2018 - Conference Schedule</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1542637560162-Q7KANJ17JC7B17VT3QHP/IMG_7579.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - BlackHoodie Bootcamp #4 Wrap Up - Berlin 2018</image:title>
      <image:caption>Veronica presenting “Linux servers under siege” at BlackHoodie 2018.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1542637589490-6KTXF857HP2U9HG9FBSB/IMG_7582.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - BlackHoodie Bootcamp #4 Wrap Up - Berlin 2018</image:title>
      <image:caption>Maria presenting “Arming Malware with GANs” at BlackHoodie 2018.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/10/6/live-class-machine-learning-for-network-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-06</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/9/19/solution-for-the-too-much-noise-ai-village-ctf-challenge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537342427916-TQHO073IK5OMRP1E36EX/secret_message.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Creating "Too much noise" in DEFCON AI village CTF challenge</image:title>
      <image:caption>Challenge image</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537446877710-U9AV3F8BFM9H84S34J38/clean_image.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Creating "Too much noise" in DEFCON AI village CTF challenge</image:title>
      <image:caption>Clean image</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537448860851-806WDOA4BP9WGBJB9QV4/Autoencoder_structure.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Creating "Too much noise" in DEFCON AI village CTF challenge</image:title>
      <image:caption>Autoencoder structure (reproduced from wikipedia)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537449162891-FO720HXBG8JI5IZKFDOF/example_digits.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Creating "Too much noise" in DEFCON AI village CTF challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537342539659-6V70KXUJBZLCUA37D0VD/asolution.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Creating "Too much noise" in DEFCON AI village CTF challenge</image:title>
      <image:caption>A solution</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/9/7/what-do-we-know-about-nanocore-rat-a-review</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1536331827721-E7FV6SJ84ECJYFV4R7RP/Screen+Shot+2018-09-07+at+16.49.54.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about NanoCore RAT? A review.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1536327567728-YFOJ0SCOUH8UYRCL3SVQ/Screen+Shot+2018-09-07+at+15.35.51.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about NanoCore RAT? A review.</image:title>
      <image:caption>NanoCore website promotes the the tool as reliable, affordable, with 24/7 support. Reference: https://web.archive.org/web/20160815000000*/nanocore.io</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1536327857117-4BVG4XDPP1QNE8BCQLRK/VtUlKWy.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - What do we know about NanoCore RAT? A review.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/8/26/notpink-the-first-security-conference-given-by-women-in-argentina</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1536021726342-BWYQIJTAQAHRYT8AGBJZ/WhatsApp+Image+2018-08-25+at+8.56.40+AM.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - NotPink: The first security conference given by women in Argentina</image:title>
      <image:caption>Almuerzo con speakers y sponsors. Sponsoreado por Deloitte.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1536021946154-5CM7Q3S47V2N5WGX2OZK/WhatsApp+Image+2018-08-26+at+3.08.59+PM.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - NotPink: The first security conference given by women in Argentina</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/8/1/1st-transylvanian-machine-learning-summer-school</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1533130460411-CPLV36VXRD8NFIKHN5QB/0043+TMLSS+Day+1.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - My first summer school</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1533130723346-RUPR5RI0HOUR3FXZU3RT/79TMLSS+Day+3.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - My first summer school</image:title>
      <image:caption>Group photo</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1533130817619-B3XYK4SUF2W3IUHPTJGF/95TMLSS+Day+3.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - My first summer school</image:title>
      <image:caption>Best poster awards (yes, I got one too :) )</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/7/11/5-things-i-learned-at-my-first-two-cybersecurity-conferences-radhika-gupta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1531315909680-9VQRMFPGQZIMC5KDFCF5/0.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - 5 Things I Learned at my First Two Cybersecurity Conferences</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1531317180681-ER7TOVE7LYJ18DX36SEQ/0+%281%29.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - 5 Things I Learned at my First Two Cybersecurity Conferences</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1531317212841-2X90JWF63D08W30QZ6W9/0+%282%29.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - 5 Things I Learned at my First Two Cybersecurity Conferences</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1531317274629-A0W1DTGUNBTR5UG9USUK/0.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - 5 Things I Learned at my First Two Cybersecurity Conferences</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/6/22/reset-2018-conference-wrap-up</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529432687437-OE4IOGXBQ3OT71VPLCVL/IMG-4901.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529434302838-BTOTWLGV9TWS8POHVIR8/Adizah+Tejani+-+1.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
      <image:caption>Adizah Tejani on her talk about Open Banking Technology.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529434419645-1FS4AVD8BJ72U322J8YC/IMG_4907.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
      <image:caption>"So this is almost where we are at the moment [with open banking]. Which doesn't fill the room with confidence..." - Adizah Tejani</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529668710562-6KC2BR153KOI7YIHC33L/image-asset.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
      <image:caption>Step 1) in becoming a 'hacker' is to determine your role in the cyber crime economy. - Rashmi Knowles</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529668870951-EOD4S9IKYOZD7T1FFWK2/wendy-nather.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
      <image:caption>Wendy Nather, ' Denial of Trust: a new attack', RESET 2018.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529672116699-HDI8XZQ8HJ3H4T9SH2G9/rebekah-brown.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
      <image:caption>The five stages of change, by Rebekah Brown. Photo credit: Zoë Rose.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529673704001-OFBHQ2VH3QF0WI061RJ6/IMG_4921.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676400163-09X01TGICMR17AM069SV/IMG_4902.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676412678-FAK2A48JBOPBNXYGJ59U/IMG_4903.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676444421-J3HU1V04SG2C6BN2NOLO/IMG_4909.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676484969-LBZ076MHUK16D26ALF7I/IMG_4912.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676472422-Z34PFBCKAU4EG06WNGGY/IMG_4917.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1529676507664-M0KL2U4I3FL3IYW7RE58/IMG_4919.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - RESET 2018 Conference Wrap-Up</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/5/29/high-level-overview-of-a-malicious-perl-bot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1527182650760-D8WU4UPN584LT4KI02J8/Screen+Shot+2018-05-24+at+19.23.24.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - High Level Overview of a Malicious Perl Bot</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1527183428431-2FAB4R06LCF15X9D3T91/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - High Level Overview of a Malicious Perl Bot</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/4/11/visit-to-the-ngo-market-2018-the-stories-of-civil-society</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1523450073835-MWMNBGHXGT2IASIXAIEC/NGO-Market-2018-1.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - Visit to the NGO Market 2018: The Stories of Civil Society</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1523450930527-TETOP2F486F2NX6M1H0Z/NGO-Market-2018-2.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - Visit to the NGO Market 2018: The Stories of Civil Society</image:title>
      <image:caption>NGO Market 2018: The Stories of Civil Society @ Forum Karlín, Prague, Czech Republic</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/3/29/how-to-create-a-small-lab-at-home-with-a-raspberry-pi-to-execute-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1522317362397-IBIS28XYV7232KYRDA4C/raspberrypi_1240376.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How to Create a Small Lab at Home with a Raspberry Pi to execute Malware - How to create a Small Lab at home with a Raspberry Pi to execute Malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1522316879786-PJB0F6XNLCCZ3NIGQWJN/Lab+Infrastructure+raspberry+pi.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - How to Create a Small Lab at Home with a Raspberry Pi to execute Malware</image:title>
      <image:caption>Your topology should look like this</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/3/26/three-years-of-publishing-malware-traffic-datasets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1522055913999-3GKO4JOMBP3IHZM3EZQO/Screen+Shot+2018-03-26+at+11.16.11.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Three Years of Publishing Malware Traffic Datasets</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2018/3/22/team-learning-basic-python-introduction-for-basic-malware-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521789507924-WZJ7J2XI1VYZVOVYUINT/IMG_3295.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521729986077-5N3PS21OXD3J3D8B4CNL/Screen+Shot+2018-03-22+at+15.44.43.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>The source code for this template is located here: https://github.com/stratosphereips/Basic-Python-Learning</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521736110146-U0BABCXHGG4U5CIC01YM/IMG_3297.JPG</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521738624261-Y77VXQNJFC7F0EZH11ZN/test.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521738943272-2POL8ONEUUVFWZFSOJZN/test2.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>There are so many nodes that the graph is totally useless. But there were more than 13000 nodes!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521789982567-V6XQI3JZ7HCNQBHMAWGA/test2-zoom.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>If we zoom to the center of the chart, we can see that DOT was actually able to plot everything, but is not the best type of visualisation we can choose.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521739288971-IL5S6WJ88DTF2AY00A2O/image-asset.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>There are 400 connections in this graph.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521739480111-Q1QSPTVIH6X2YXFCUMZN/test4.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>There are 2000 connections in this graph.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1521740079521-EEIPTNJC98IAPHO5IZKG/test5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - Team Learning: Python Introduction for Network Traffic Visualisation</image:title>
      <image:caption>There are 5000 connections in this graph (low resolution due file size limit on square space)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2017/6/19/nomad-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/10/12/ccdetector-and-botnet-detector-comparer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/7/17/new-dataset-ctu-13-extended-now-includes-pcap-files-of-normal-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/3/26/differences-on-the-behavioral-patterns-of-malware-and-normal-dns-connections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/3/25/the-importance-of-good-labels-in-security-datasets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510159141731-G7W96QGOBNFIM7I5GX6O/label-warranty-1.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - The Importance of Good Labels in Security Datasets</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/3/24/first-phase-of-the-stratosphere-ips-project-ready</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/3/12/analysis-of-the-traffic-of-an-apk-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2015/3/12/how-to-install-and-run-argus-sniffer-in-your-raspberry-pi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2014/11/10/malware-uses-multiple-web-servers-to-have-a-periodic-http-cc-connection-while-its-netflows-are-not-periodic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510154490121-SR4H0EFBT97GPX4F558O/7479220_orig.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - MALWARE USES MULTIPLE WEB SERVERS TO HAVE A PERIODIC HTTP C&amp;C CONNECTION WHILE ITS NETFLOWS ARE NOT PERIODIC</image:title>
      <image:caption>  Some hours of traffic in the CTU-89-1 capture</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2014/8/5/malware-started-to-randomize-the-request-times-in-relation-with-their-cc-channels</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510154089000-LIM0PXM9A3PX5DJJXS7K/9923682_orig.jpeg</image:loc>
      <image:title>Stratosphere IPS Research Blog - MALWARE STARTED TO RANDOMIZE THE REQUEST TIMES IN RELATION WITH THEIR C&amp;C CHANNELS</image:title>
      <image:caption>Histogram of time differences between packets for the DGA.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2014/03/9/example-of-using-stf-for-detecting-cc-channels-an-analysis-of-a-pushdo-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/2014/03/1/analisis-of-ctu-malware-capture-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149053752-TNEHAYFLX45BIN2UONU1/Figure-1.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149244622-2I3LWRUZ7ZXE9APE6S52/Figure-2.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149337890-3UQXL0REPIMVTL7TGL83/Figure-3.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149378269-BMWKVQZNNJIT1E5M3CF4/Figure-4.jpg</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149570542-E7WNRM06VHTZFKVDOK7Y/Figure-5.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510149645931-OWPGQV6FB1Z4AYOLG0N4/Figure-6.png</image:loc>
      <image:title>Stratosphere IPS Research Blog - ANALISIS OF CTU-MALWARE-CAPTURE-1 (ZBOT.OOWO)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Underground+Economy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/cybercrime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Blocklist+Project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Laboratory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Machine+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Teaching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Datasets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/malware+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Project+Ludus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Stratosphere+Linux+IPS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/GSoC2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Education</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Slips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/traffic+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/AIVPN</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/shellm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Python</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Honeypots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Mischief</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Reinforcement+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/GSoC2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Aposemat+Project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/Propaganda</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/category/publications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/education</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/shadow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/release</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/DNS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/iot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/llms</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/threat+hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/latin+america</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/QUIC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/traffic+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/https</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/glutton</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/shellm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/DOH</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/events</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ciberseguridad</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/introduction+to+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/rat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/apt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/DOQ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/DOT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/zeek</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/stratosphere+linux+ips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/javascript</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/passwd</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/install</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/underground</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/red+team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/threat+intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Functional+Metrics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/data+viz</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/gui</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/gsoc2024</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/doh</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/poster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/privacy+attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/infection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/conference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/blackhat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/aivpn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/gsoc2023</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/doq</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/computational+propaganda</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/dot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/AIDojo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/smb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/aip</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/students</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/serpapi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/teaching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/traffic+capture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/immunity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/measurement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/cve</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Explainable+AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/allowlists</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/aposemat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/feeds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Behavioral+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/camera</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/uptimerobot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/macos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/nlnet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/funding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Dataset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/pyration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/machine+learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/open+informatics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/secure+dns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/edimax</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Turris</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/IoT-23Dataset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/splunk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/collectress</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/best+paper+award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/cvut</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/publications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/binary+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/SCSD</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/defending</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/IoT23Dataset</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/fel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ieee</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/malware+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/active+directory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/safelist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Graphs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/taxii</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/protocols</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ctu+in+prague</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Large+Language+Models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/fake+news</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Python</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ML</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/excution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/blocklist</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/summer+school</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/game+theory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/hacktivism</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/geost</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/trojan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/DEFCON</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/tool</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/civilsphere</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/network+traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/IoT+laboratory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/node.js</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/slips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/AI+agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/survey</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ids</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/support</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/wacco</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/arsenal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/h0neytr4p</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/cybercrime</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/stratocyberlab</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Security+Games</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/android</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/free-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/diagrams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/training</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/anomaly+detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/CZNIC</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/machete</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/interface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/raspberry+pi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/IoT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/docker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/deep+learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/white+paper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/award</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/paper</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/TA%C4%8CR</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/htbot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ipv6</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/linux</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ngo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/talks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/otev%C5%99en%C3%A1+informatika</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/oi</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/obfuscation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/blue+team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/wrapup</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/data+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/sap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/remote+access+trojan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/propaganda</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/network+traffic+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Reinforcement+Learning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/reverse+engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Guest+Post</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/llm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/attacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/honeypot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/gsoc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/Explanation+Evaluation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/yara+rules</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/ngomarket</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/CTF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/eurosp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/translation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/malware+research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/botnet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/owaspcz</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/blog/tag/APK</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-09-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510062563172-LMM03XB4Q3IQX076NOBU/stratosphere-stock-3.jpg</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524131391-41S396GGQN3CT4BG22MC/sebas-garcia.webp</image:loc>
      <image:title>Home - Sebastian Garcia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130925-4U7RW8P6OHDTUYLGC8IW/Screenshot%2B2022-02-03%2Bat%2B0.05.48.webp</image:loc>
      <image:title>Home - Veronica Valeros</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126625-DRL75NAG4V1H6EBFZGUO/maria-rigaki.webp</image:loc>
      <image:title>Home - Maria Rigaki</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128653-V47E9TQ2YVLMWX5S3FBE/Ondrej-Lukas.webp</image:loc>
      <image:title>Home - Ondřej Lukáš</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128376-VH0G44NESZY92156I2A6/muris_sladic.webp</image:loc>
      <image:title>Home - Muris Sladić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124439-FWHZIGYROBIY0Y9550GU/1678556794919.webp</image:loc>
      <image:title>Home - Alya Gomaa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126699-A8U4803VYF3S20771VHJ/martin-repa.webp</image:loc>
      <image:title>Home - Martin Řepa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125649-1S1Y9AD07J614ISKX9KS/lukas-forst.webp</image:loc>
      <image:title>Home - Lukáš Forst</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773673125286-5JN68M91N1NC0GER9LIT/Carlos+Catania.jpeg</image:loc>
      <image:title>Home - Carlos Catania</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1774948973583-QDYD119ZK4EVCLPCZKR2/svoboda_headshot.webp</image:loc>
      <image:title>Home - Jan Svoboda</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130473-B8YXKEGHIE5ENKTH2IP0/profile.webp</image:loc>
      <image:title>Home - Eman Alibalić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129867-4TNL2FRKHWPCCYIS04DR/Photo.webp</image:loc>
      <image:title>Home - Juan Ignacio Bousquet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127482-VJ57B95USHN91X2WE17A/masarah.webp</image:loc>
      <image:title>Home - Masarah Paquet-Clouston</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124469-N8GIB5F2UBIAFYYE0XZE/anna.webp</image:loc>
      <image:title>Home - Anna Širokova</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128797119-D0YA9W28UBPUNPU6A2EI/kucera-jan.jpeg</image:loc>
      <image:title>Home - Jan Kučera</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125657-GDHIM14XBMJLEW1YLZVH/bryan.webp</image:loc>
      <image:title>Home - Bryan Campbell</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128850976-V3525YL9RSL6AREO0AW6/forni-diego.jpeg</image:loc>
      <image:title>Home - Diego Forni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127754-NEBHX0M5FG2Y6NHN6LWM/Mohammad-Amr-Khan-1x1.webp</image:loc>
      <image:title>Home - Mohammad Amr Khan</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129374-SFFS6NT4A81FBV0DU4M4/pavel-janata.webp</image:loc>
      <image:title>Home - Pavel Janata</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2024/5/26/large-language-models-as-defensive-honeypots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2023/5/26/a-network-dataset-of-normal-malware-attack-and-background-traffic-on-a-real-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/nq79sbsgl8grtydi976h1o0o5da2ik</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2022/3/12/federated-learning-for-network-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2022/3/12/global-permissionless-p2p-system-for-sharing-distributed-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2022/3/12/detection-of-computational-propaganda-according-to-its-spread-on-the-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2022/3/12/trust-model-for-global-peer-to-peer-intrusion-prevention-system</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2021/5/20/machine-learning-privacy-analysis-and-implementation-of-model-extraction-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/execution-analysis-and-detection-of-android-rats-traffic-dfemh</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1616415962817-CH2GMFOD3RKQ9P01I9MD/Thomas%2BO%2527Hara.jpg</image:loc>
      <image:title>Thesis Projects - The Attacker IP Prioritizer : An IoT Optimized Blacklisting Algorithm</image:title>
      <image:caption>Thomas O’Hara</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/gnn-for-ad-honeypot</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1615476688147-48KJ97II35YZ2VQQUBT1/b0e8ec6443191356e99cbeadcff2245bf0cde46f.jpg</image:loc>
      <image:title>Thesis Projects - Graph Generative Models for Decoy Targets in Active Directory</image:title>
      <image:caption>Ondrej Lukas</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/execution-analysis-and-detection-of-android-rats-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613382844632-Y560XEL387ZV1JIAIDA9/kami.jpg</image:loc>
      <image:title>Thesis Projects - Execution, Analysis and Detection of Android RATs traffic</image:title>
      <image:caption>Kamila Babayeva</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/5/23/trust-models-on-adversarial-distributed-security-agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1590235286095-8JEPQ09BM1I3T0RKH3WN/Dita-aic.jpg</image:loc>
      <image:title>Thesis Projects - Trust models on adversarial distributed security agents</image:title>
      <image:caption>DITA HOLLMANNOVÁ</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/5/23/the-first-comprehensive-report-on-the-state-of-the-security-of-mobile-phones-of-civil-society</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1590233085257-FBQHROYV9FWLB592V0YC/Civilsphere.png</image:loc>
      <image:title>Thesis Projects - The first comprehensive report on the state of the security of mobile phones of civil society</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/identifying-malicious-hosts-by-aggregation-of-partial-detections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587585052513-2721990TIH40XH5M15VH/Ondrej-Lukas.jpg</image:loc>
      <image:title>Thesis Projects - IDENTIFYING MALICIOUS HOSTS BY AGGREGATION OF PARTIAL DETECTIONS</image:title>
      <image:caption>ONDŘEJ LUKÁŠ</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/identification-of-network-users-by-profiling-their-behavior</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587584883475-5RVLR1DF0LY0MFDWWYW4/StratoLogo.png</image:loc>
      <image:title>Thesis Projects - IDENTIFICATION OF NETWORK USERS BY PROFILING THEIR BEHAVIOR</image:title>
      <image:caption>DAVID KUBEŠA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/graph-based-analysis-of-malware-network-behaviors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587584762381-48QZ50YBRW52MXQIMZ08/StratoLogo.png</image:loc>
      <image:title>Thesis Projects - GRAPH-BASED ANALYSIS OF MALWARE NETWORK BEHAVIORS</image:title>
      <image:caption>DANIEL ŠMOLIK</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/manati-web-assistance-for-the-threat-analysis-supported-by-domain-similarity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587584525099-RKKQIQ3J6WEQWCT0C95R/Raul-Benitez.jpeg</image:loc>
      <image:title>Thesis Projects - MANATI: WEB ASSISTANCE FOR THE THREAT ANALYSIS SUPPORTED BY DOMAIN SIMILARITY</image:title>
      <image:caption>RAUL BENITEZ NETO</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/anomaly-detection-of-host-roles-in-computer-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/18661531-3def-4ceb-9e2c-7a45222ecd36/new_yura_pic.jpg</image:loc>
      <image:title>Thesis Projects - ANOMALY DETECTION OF HOST ROLES IN COMPUTER NETWORKS</image:title>
      <image:caption>YURY KASIMOV</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/detection-of-security-attacks-on-networks-using-ensembling-techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587584121369-H9DDWWGEH04YM1HGKWX6/PaulaVenosa-UNLP3.jpg</image:loc>
      <image:title>Thesis Projects - DETECTION OF SECURITY ATTACKS ON NETWORKS USING ENSEMBLING TECHNIQUES</image:title>
      <image:caption>PAULA VENOSA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/profiling-and-detection-of-iot-attacks-in-telnet-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587583637060-G5TDQZZ8N5V4NPSXKKWF/simona-profile.jpg</image:loc>
      <image:title>Thesis Projects - PROFILING AND DETECTION OF IOT ATTACKS IN TELNET TRAFFIC</image:title>
      <image:caption>SIMONA MUSILOVA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/analysis-and-comparison-of-the-characteristics-of-high-performance-systems-and-botnets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587583458969-XBJDZ5YVFAZY9R9QN8DG/mariajose.jpg</image:loc>
      <image:title>Thesis Projects - ANALYSIS AND COMPARISON OF THE CHARACTERISTICS OF HIGH PERFORMANCE SYSTEMS AND BOTNETS</image:title>
      <image:caption>MARIA JOSE ERQUIAGA</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/should-i-click-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587583104035-CBHE0OZATR8EH289FR4Q/image-asset.jpeg</image:loc>
      <image:title>Thesis Projects - Should I click on a link? Machine Learning to Protect from Cyber Attacks on the Web</image:title>
      <image:caption>FRANTIŠEK STŘASÁK</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2020/4/22/behavioral-analysis-and-detection-of-iot-malware-using-the-irc-protocol</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587583000623-HN4GN3W67QT2EH1FBZ25/image-asset.jpeg</image:loc>
      <image:title>Thesis Projects - BEHAVIORAL ANALYSIS AND DETECTION OF IOT MALWARE USING THE IRC PROTOCOL</image:title>
      <image:caption>ONDŘEJ PRENĚK</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/2017/6/20/detection-of-https-malware-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-03-12</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/category/Finished</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/category/Ongoing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Martin+%C5%98epa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Muris+Sladi%C4%8B</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Ond%C5%99ej+Lukas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Raul+Benitez+Neto</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Master+Thesis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/David+Kube%C5%A1a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Jakub+%C4%8Cech</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Lukas+Forst</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Franti%C5%A1ek+St%C5%99as%C3%A1k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Kamila+Babayeva</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Daniel+%C5%A0molik</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Vit+Karafiat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/%C5%A0t%C4%9Bp%C3%A1n+Bendl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Maria+Jose+Erquiaga</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Yury+Kasimov</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Ond%C5%99ej+Pren%C4%9Bk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Thomas+O%27Hara</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Pavel+Janata</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Simona+Musilova</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Paula+Venosa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Ond%C5%99ej+Bou%C4%8Dek</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Bachelor+Thesis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects-list/tag/Dita+Hollmannov%C3%A1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/job-opportunities</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-04-18</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/job-opportunities/category/Open+Positions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-08</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/11/10/hack-me-do-deploying-an-iot-malware-laboratory-to-analyze-malicious-behavior</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589126979582-SAK4OB0YSE2DJTAWK0HT/audit-3737447_640.jpg</image:loc>
      <image:title>Publications - Hack me-do. Deploying an IoT Malware Laboratory to Analyze Malicious Behavior</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/10/31/ensembling-to-improve-infected-hosts-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589126510801-SW2G0JMTPO2S7DXFYNR4/Publications+%285%29.png</image:loc>
      <image:title>Publications - Ensembling to improve infected hosts detection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/9/20/detecting-dns-threats-a-deep-learning-model-to-rule-them-all</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589121446607-VRAA1ZXU1ZKRW6OAX8VG/Frequency-Character-Distribution.png</image:loc>
      <image:title>Publications - Detecting DNS Threats: A Deep Learning Model to Rule Them All</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/8/19/geost-botnet-operational-security-failures-lead-to-a-new-android-banking-threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589121164958-CMAJUC91PJVOJ483564Z/Geost-Poster.png</image:loc>
      <image:title>Publications - Geost Botnet: Operational security failures lead to a new Android banking threat</image:title>
      <image:caption>Figure 1. Discovery of Geost. Our instance of HtBot was used by the Geost botmasters, relaying data to our bot when they accessed the C&amp;C server.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/6/19/machete-dissecting-the-operations-of-a-cyber-espionage-group-in-latin-america</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589121570351-EC0PU2VZBQS1MKHLMKF3/machete.png</image:loc>
      <image:title>Publications - Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2019/5/19/deep-convolutional-neural-networks-for-dga-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589124813491-0FULEOJBFAOJRJM3CQMA/image-asset.jpeg</image:loc>
      <image:title>Publications - Deep Convolutional Neural Networks for DGA Detection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2018/10/31/an-analysis-of-convolutional-neural-networks-for-detecting-dga</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589125166726-F527E34YW5LDKH16UOS2/Publications+%283%29.png</image:loc>
      <image:title>Publications - An Analysis of Convolutional Neural Networks for detecting DGA</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2018/5/24/bringing-a-gan-to-a-knife-fight-adapting-malware-communication-to-avoid-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589121668246-U0ERTCSMRA8Y86ICD83M/GANs.png</image:loc>
      <image:title>Publications - Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2018/5/5/arming-malware-with-gans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589121997311-S8HEQ7CO1QTDD6KPIOOO/Maria-GANs-talk-Security-Sessions.png</image:loc>
      <image:title>Publications - Arming Malware with GANs</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2020/5/5/reliable-machine-learning-for-networking-key-issues-and-approaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589124890098-1NQF5EEL853VMDE6HCAT/audit-3737447_640.jpg</image:loc>
      <image:title>Publications - Reliable Machine Learning for Networking: Key Issues and Approaches.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2020/5/5/detection-of-https-malware-traffic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589122680649-G7G6TSUWVRBX9YITKIU7/Strasak.png</image:loc>
      <image:title>Publications - Detection of HTTPS Malware Traffic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2017/5/5/6w4wkdy4lv9p47p0xli6driqle74or</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589123512546-BAMN88KRJA10TEXB2Q8J/Publications-1.png</image:loc>
      <image:title>Publications - Observer effect: How Intercepting HTTPS traffic forces malware to change their behavior</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2016/6/15/detecting-dga-malware-traffic-through-behavioral-models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589125487681-77L5HBN8U0NP92LCCRHJ/Publications+%284%29.png</image:loc>
      <image:title>Publications - Detecting DGA malware traffic through behavioral models</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2015/12/21/the-network-behavior-of-targeted-attacks-models-for-malware-identification-and-detection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589122158184-UJ7DP9WGRS4FQ7EFT221/Garcia.png</image:loc>
      <image:title>Publications - The Network Behavior of Targeted Attacks. Models for Malware Identification and Detection.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2015/10/5/modelling-the-network-behaviour-of-malware-to-block-malicious-patterns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589122548714-GPN7T0H2719Y9CT2O1RV/Characteristics+of+the+botnet+captures.+%28CF_+Click+Fraud%2C+PS_+Port+Scan%2C+US_+Compiled+and+controlled+by+us.%29.png</image:loc>
      <image:title>Publications - Modelling the Network Behaviour of Malware To Block Malicious Patterns</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2014/12/5/identifying-modeling-and-detecting-botnet-behaviors-in-the-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589123855289-ORH07A09QNSTOUVH49B8/Summary-schema-of-the-BClus-detection-method_W640.jpg</image:loc>
      <image:title>Publications - Identifying, Modeling and Detecting Botnet Behaviors in the Network</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2014/5/11/an-empirical-comparison-of-botnet-detection-methods</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589124122727-VVQK4ZQPQYIMUX3YSDVM/Publications+%281%29.png</image:loc>
      <image:title>Publications - An Empirical Comparison of Botnet Detection Methods</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/2013/01/5/survey-on-network-based-botnet-detection-methods</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1589124320109-UW6781CYM3BJWQ1JE0K6/Publications+%282%29.png</image:loc>
      <image:title>Publications - Survey on Network-based Botnet Detection Methods.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/category/Conferences</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/category/Conference+Talk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/category/Thesis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/category/Journals+and+Books</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/D%C3%ADaz</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Hammerschmidt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Verwer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Garino</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Erquiaga</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Shirokova</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/St%C5%99as%C3%A1k</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Venosa</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Torres</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Guerra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Grill</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Rigaki</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Catania</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Valeros</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Zunino</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2019</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2018</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Campo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2017</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2016</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2015</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2014</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/State</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Garcia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/2013</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Stiborek</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications/tag/Palau</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/2025/5/13/ai-based-attacking-agent</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/2025/5/13/llm-based-honeypots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/2025/5/13/network-security-dataset-creation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/category/Thesis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/Datasets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/AI</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/Agents</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/Cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/LLM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-openings/tag/Honeypots</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/our-people</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524131391-41S396GGQN3CT4BG22MC/sebas-garcia.webp</image:loc>
      <image:title>Our People - Sebastian Garcia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524131391-41S396GGQN3CT4BG22MC/sebas-garcia.webp</image:loc>
      <image:title>Our People - Sebastian Garcia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130925-4U7RW8P6OHDTUYLGC8IW/Screenshot%2B2022-02-03%2Bat%2B0.05.48.webp</image:loc>
      <image:title>Our People - Veronica Valeros</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126625-DRL75NAG4V1H6EBFZGUO/maria-rigaki.webp</image:loc>
      <image:title>Our People - Maria Rigaki</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128653-V47E9TQ2YVLMWX5S3FBE/Ondrej-Lukas.webp</image:loc>
      <image:title>Our People - Ondřej Lukáš</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128376-VH0G44NESZY92156I2A6/muris_sladic.webp</image:loc>
      <image:title>Our People - Muris Sladić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124439-FWHZIGYROBIY0Y9550GU/1678556794919.webp</image:loc>
      <image:title>Our People - Alya Gomaa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126699-A8U4803VYF3S20771VHJ/martin-repa.webp</image:loc>
      <image:title>Our People - Martin Řepa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125649-1S1Y9AD07J614ISKX9KS/lukas-forst.webp</image:loc>
      <image:title>Our People - Lukáš Forst</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773673125286-5JN68M91N1NC0GER9LIT/Carlos+Catania.jpeg</image:loc>
      <image:title>Our People - Carlos Catania</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1774948973583-QDYD119ZK4EVCLPCZKR2/svoboda_headshot.webp</image:loc>
      <image:title>Our People - Jan Svoboda</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130473-B8YXKEGHIE5ENKTH2IP0/profile.webp</image:loc>
      <image:title>Our People - Eman Alibalić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129867-4TNL2FRKHWPCCYIS04DR/Photo.webp</image:loc>
      <image:title>Our People - Juan Ignacio Bousquet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127482-VJ57B95USHN91X2WE17A/masarah.webp</image:loc>
      <image:title>Our People - Masarah Paquet-Clouston</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124469-N8GIB5F2UBIAFYYE0XZE/anna.webp</image:loc>
      <image:title>Our People - Anna Širokova</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128797119-D0YA9W28UBPUNPU6A2EI/kucera-jan.jpeg</image:loc>
      <image:title>Our People - Jan Kučera</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125657-GDHIM14XBMJLEW1YLZVH/bryan.webp</image:loc>
      <image:title>Our People - Bryan Campbell</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128850976-V3525YL9RSL6AREO0AW6/forni-diego.jpeg</image:loc>
      <image:title>Our People - Diego Forni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127754-NEBHX0M5FG2Y6NHN6LWM/Mohammad-Amr-Khan-1x1.webp</image:loc>
      <image:title>Our People - Mohammad Amr Khan</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129374-SFFS6NT4A81FBV0DU4M4/pavel-janata.webp</image:loc>
      <image:title>Our People - Pavel Janata</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/new-cover-page-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/download</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/projects-civilsphere</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-07-19</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/publications-overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-05-11</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/stratosphere-ips-suite</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/team</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/f5f225b0-95e5-4a80-9bad-af7d97673462/stratologo-letters.jpeg</image:loc>
      <image:title>Our Team - Stratosphere Laboratory</image:title>
      <image:caption>Cybersecurity, AI, helping society.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524131391-41S396GGQN3CT4BG22MC/sebas-garcia.webp</image:loc>
      <image:title>Our Team - Sebastian Garcia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130925-4U7RW8P6OHDTUYLGC8IW/Screenshot%2B2022-02-03%2Bat%2B0.05.48.webp</image:loc>
      <image:title>Our Team - Veronica Valeros</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126625-DRL75NAG4V1H6EBFZGUO/maria-rigaki.webp</image:loc>
      <image:title>Our Team - Maria Rigaki</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128653-V47E9TQ2YVLMWX5S3FBE/Ondrej-Lukas.webp</image:loc>
      <image:title>Our Team - Ondřej Lukáš</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524128376-VH0G44NESZY92156I2A6/muris_sladic.webp</image:loc>
      <image:title>Our Team - Muris Sladić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124439-FWHZIGYROBIY0Y9550GU/1678556794919.webp</image:loc>
      <image:title>Our Team - Alya Gomaa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524126699-A8U4803VYF3S20771VHJ/martin-repa.webp</image:loc>
      <image:title>Our Team - Martin Řepa</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125649-1S1Y9AD07J614ISKX9KS/lukas-forst.webp</image:loc>
      <image:title>Our Team - Lukáš Forst</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773673125286-5JN68M91N1NC0GER9LIT/Carlos+Catania.jpeg</image:loc>
      <image:title>Our Team - Carlos Catania</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1774948973583-QDYD119ZK4EVCLPCZKR2/svoboda_headshot.webp</image:loc>
      <image:title>Our Team - Jan Svoboda</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524130473-B8YXKEGHIE5ENKTH2IP0/profile.webp</image:loc>
      <image:title>Our Team - Eman Alibalić</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129867-4TNL2FRKHWPCCYIS04DR/Photo.webp</image:loc>
      <image:title>Our Team - Juan Ignacio Bousquet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127482-VJ57B95USHN91X2WE17A/masarah.webp</image:loc>
      <image:title>Our Team - Masarah Paquet-Clouston</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524124469-N8GIB5F2UBIAFYYE0XZE/anna.webp</image:loc>
      <image:title>Our Team - Anna Širokova</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128797119-D0YA9W28UBPUNPU6A2EI/kucera-jan.jpeg</image:loc>
      <image:title>Our Team - Jan Kučera</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524125657-GDHIM14XBMJLEW1YLZVH/bryan.webp</image:loc>
      <image:title>Our Team - Bryan Campbell</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1773128850976-V3525YL9RSL6AREO0AW6/forni-diego.jpeg</image:loc>
      <image:title>Our Team - Diego Forni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524127754-NEBHX0M5FG2Y6NHN6LWM/Mohammad-Amr-Khan-1x1.webp</image:loc>
      <image:title>Our Team - Mohammad Amr Khan</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1755524129374-SFFS6NT4A81FBV0DU4M4/pavel-janata.webp</image:loc>
      <image:title>Our Team - Pavel Janata</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/da408c88-d5e5-4015-ae0d-3d7a9c4f1afd/escudo+uncuyo+color+2023.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/84385ac3-c659-4da0-b195-b0a93dd17b50/Pro+obrazovku.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/35577614-e686-48b1-8988-5c673a27a652/Primary-Compact.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/5b746e5e-952c-495d-9c84-06429de03a2e/UK-logo-square-EN.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/c43174d2-451e-4ed0-96e0-f9d2fafd12df/.png_TuDelft_logo_rgb.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/3429a4e9-0da5-4a2f-882a-c4f4c83f1e09/Logo_AIC_FEECTU_Primary_v2.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510022419845-T98BV40EAV4OTUDQMOR5/NLNet+Foundation.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613145036386-QM942UAMKKHC662Z0PPO/uptimerobot.jpg</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510064325763-CMHM3BSFW7BVN6SRITB1/Dot+CZ+logo+2012.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613145078449-9JPMB5NJZLKLSFY71QA3/riskiqlogo.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510066525305-07K54NHUV6ACXI6C173X/avast_foundation.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510083514326-6PUQ4AS0UA1OY1K9DWIM/whalebone-logo.png</image:loc>
      <image:title>Our Team</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1641809330407-KC52EJGW8P8ENXBP9RZE/images.png</image:loc>
      <image:title>Our Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851571584-ZFVGYDHKMK6TUMNFC6CK/Albert01.jpg</image:loc>
      <image:title>Our Team - A. MÖHWALD</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851583221-QQD2X0QZHK8YTL6OKG5H/Zally.jpg</image:loc>
      <image:title>Our Team - Q. MEZA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851596696-4W0NSRFP1V26ZF8ZN4H1/isra-stratosphere.png</image:loc>
      <image:title>Our Team - ISRAEL LEIVA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851747240-SFBWGYDUQM3I8RCRV9XZ/jacobo-600px.jpeg</image:loc>
      <image:title>Our Team - JACOBO NAJERA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851639573-ZDUUZ7F08BKGGIJ8S2JS/StratoLogo.png</image:loc>
      <image:title>Our Team - DAVID KUBEŠA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851649476-8RUN3GNYK7KHMMHR6U45/StratoLogo.png</image:loc>
      <image:title>Our Team - DANIEL ŠMOLIK</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571851670465-M27BWTLY0ZMJHG5738ZI/Civilsphere.png</image:loc>
      <image:title>Our Team - JAKUB HLUSIČKA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1572873854545-LTI1VT74YL26N0ZH6RM4/Raul-Benitez.jpeg</image:loc>
      <image:title>Our Team - RAUL BENITEZ</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1572873863807-B9QYCMC5BU9MKUON0OMC/Martin04.jpg</image:loc>
      <image:title>Our Team - MARTIN ŘEPA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581086378856-DO64FLDQ7M386OE35AL1/simona-profile.jpg</image:loc>
      <image:title>Our Team - S. MUSILOVA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581086452333-9E6Q20JMX7SWSJRWH2UC/kalin-sq.jpg</image:loc>
      <image:title>Our Team - KALIN IVANOV</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581086495803-HQD62S99WDX9JQ353BVY/karel-durkota.jpg</image:loc>
      <image:title>Our Team - KAREL DURKOTA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581371424822-C1LAEKT9LJNWHURYHE8Z/AgustinParmisano.jpg</image:loc>
      <image:title>Our Team - AGUSTIN PARMISANO</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581371424784-JTA5DXJI0LQ6AAR4FUCN/Ashwin.jpg</image:loc>
      <image:title>Our Team - ASHWIN NEDUNGADI</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587712910627-C8C83OPZVMJ8PRCE2NRK/jan_fajfer_square.jpeg</image:loc>
      <image:title>Our Team - JAN FAIJFER</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587712910645-7VTSMVBPOK71BA5TRLWU/jowabels.jpg</image:loc>
      <image:title>Our Team - JOACHIM SUICO</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1597429379371-FJ7AZ5GEASZAF98F1SKI/Civilsphere.png</image:loc>
      <image:title>Our Team - JAKUB ČECH</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1603194509514-PJNNQT3INLZ05NYVBQ5Z/Lisandro+Ubiedo.jpeg</image:loc>
      <image:title>Our Team - LISANDRO UBIEDO</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1603194517018-W7PTU5Q5GDDRBR5OFENQ/ondrejp.jpg</image:loc>
      <image:title>Our Team - ONDREJ PRENEK</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1603194607737-6JHQIB11Y7YNQ370RIW3/Dita-aic.jpg</image:loc>
      <image:title>Our Team - DITA HOLLMANNOVA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1615804282731-RB9CNW8B4J269ZL3EPXX/franco.jpg</image:loc>
      <image:title>Our Team - FRANCO PALAU</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1615804289000-ABLEB6OQ01SS8WT8B6JM/Carlos_Catania.jpg</image:loc>
      <image:title>Our Team - CARLOS CATANIA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1615804298945-HL8040XD2USN7AK21Q61/maria-jose-4x4.jpg</image:loc>
      <image:title>Our Team - MARIA J. ERQUIAGA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1647015004472-RTZYY7EIZ8V53ZHA5CHW/thomas-o%27hara.jpeg</image:loc>
      <image:title>Our Team - THOMAS O'HARA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1649247949056-DI2VWXQ30V8RVY39JWS4/mohamed_tita_1x1.jpeg</image:loc>
      <image:title>Our Team - MOHAMAD TITA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1649248375113-B7DD0I9XEKDBJKBBW1PY/frantisek.jpeg</image:loc>
      <image:title>Our Team - FRANTIŠEK STŘASAK</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1649248377145-OGZMQNL9GBBSOZRAFFQE/vit-karafiat-1x1.png</image:loc>
      <image:title>Our Team - VÌT KARAFIÁT</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1624287533558-DGE4XJC7LKY9CP4CGRVK/image5.jpg</image:loc>
      <image:title>Our Team - KAMILA BABAYEVA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1681815471082-6MCS66VAFH6H8HGGJP9Q/serge-o.png</image:loc>
      <image:title>Our Team - SERGE-OLIVIER PAQUETTE</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1685688380489-RU7XCH17A58X66OPBYAB/elnaz.jpg</image:loc>
      <image:title>Our Team - ELNAZ BABAYEVA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1702916334987-KLFWO9ZQI4U8V43T4ZZT/bendl%2BLarge.jpeg</image:loc>
      <image:title>Our Team - Štěpán Bendl</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1702916374008-QR40O9ADEL0WJOM7EKC4/joaquin_strato.jpg</image:loc>
      <image:title>Our Team - Joaquin Bogado</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1713116719208-RJZ86LFSKTQXVIH33CXK/arti.jpg</image:loc>
      <image:title>Our Team - ARTI BANDHANA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1751882460212-ECF7HEE99TLQK0T1K2K6/davidotta.jpg</image:loc>
      <image:title>Our Team - DAVID OTTA</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1751882460218-G2VQGDMXIAWXSOAXDLN6/Martijn.jpg</image:loc>
      <image:title>Our Team - MARTIJN GROOTEN</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1751882461273-9TBSFYP91H54UT2LALD2/miroh.jpg</image:loc>
      <image:title>Our Team - MIROSLAV HOLEČEK</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1751882461353-BBL2A2KL5JDGK2HNJLKC/SlavaL.jpg</image:loc>
      <image:title>Our Team - VIACHESLAV LARIONOV</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1767707054645-L86FD67Q0BUJIDJRP0TW/new_yura_pic.jpg</image:loc>
      <image:title>Our Team - YURY KASIMOV</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1774182824882-O1IIDGSRAI3429J5G6YY/tigran_id_photo.webp</image:loc>
      <image:title>Our Team - TIGRAN OGANESIAN</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/technology</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510078874934-TJMWQAYKQ6TFZ1APQ2IO/Screen+Shot+2017-11-07+at+15.15.57.png</image:loc>
      <image:title>Datasets Overview</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510078965282-GP6PSJ6TJ42LCQADGS3S/Screen+Shot+2017-11-07+at+15.16.22.png</image:loc>
      <image:title>Datasets Overview</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510079032913-7D1KCEIA5WB872AD6JN4/Screen+Shot+2017-11-07+at+15.18.45.png</image:loc>
      <image:title>Datasets Overview</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1545396206690-CP7L27LU70C6RI4MO5Y0/aposemat1.jpg</image:loc>
      <image:title>Datasets Overview</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5411ffcfe4b065f40cc78e37/1410549503016-FX7BY2QPAPQPQZPX8H5W/Trade+18_0559.jpg</image:loc>
      <image:title>Contact</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-normal</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-mixed</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/manati</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1520700446470-KKMS5KBG6L3WOIPJPAAT/ManaTI_project_3.jpg</image:loc>
      <image:title>ManaTI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1520013595005-XA43RR991AIQQNODXL6M/workflow_manati.png</image:loc>
      <image:title>ManaTI</image:title>
      <image:caption>ManaTI Workflow</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1520012567957-NZZO8CSX9Z0JPRJ3QVK9/manati_external_intelligence.png</image:loc>
      <image:title>ManaTI</image:title>
      <image:caption>For seeing the third-party options the user must use the contextual menu</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1520012744315-9U8P548Y515RD1RGP8F3/manati_vt_modal.png</image:loc>
      <image:title>ManaTI</image:title>
      <image:caption>This image shows a request to VirusTotal about an specific IP</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1520012894979-5GDG31YFVVP61ADBFTUE/manati_vt_moda_domain.png</image:loc>
      <image:title>ManaTI</image:title>
      <image:caption>This image shows a request to VirusTotal about an specific domain name</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/stratosphere-ips-for-linux</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-ctu13</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510069396377-GJO1XFHKN81I4TDATY77/Table2.jpg</image:loc>
      <image:title>CTU-13 Dataset</image:title>
      <image:caption>Table 2. Characteristics of botnet scenarios</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510069489815-A8619PM0C48ZVTAQHQR3/image-asset.jpeg</image:loc>
      <image:title>CTU-13 Dataset</image:title>
      <image:caption>Table 3. Amount of data on each botnet scenario</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510069535476-AO1EJKKV3EAZLRDOV8ZC/Table4.jpg</image:loc>
      <image:title>CTU-13 Dataset</image:title>
      <image:caption>Table 4. Distribution of labels in the NetFlows for each scenario in the dataset.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/stratosphere-testing-framework</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510146590265-98TWUTDPX757YQQ6C1OC/letter-assignment-behavioral-models.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510146856679-QIHI9KG0KCPEHQ7Y0G3P/image-asset.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510147953479-G25YFUUYIY79UTVAVPNS/STF-2.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148048344-QND69SD3IAMZAKIJO85L/STF-3.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148102549-500X5Z4THWH4LU7DMYWU/STF-3.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148221417-QLLRCPQ76XP3CGOWRJCP/STF-5.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148325772-78ZFXKRQV2LDYU0FK01G/STF-6.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148353702-TIHCL5BQS55HT2TP320J/STF-7.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1510148381008-5ECSRUMCE89XFZP5BMLY/STF-8.png</image:loc>
      <image:title>Stratosphere Testing Framework</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/civilsphere</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1537449378254-Z655KQ4JT35CQNY1B4DP/Civilsphere.jpg</image:loc>
      <image:title>Civilsphere Project</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/aposemat</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-04-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1545395043096-OHFKO7BHPS1DAHLHAB72/image-asset.jpeg</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1545395219028-NBEWHD8OJRRZ5WF8I3R1/avast-logo.jpg</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1545394958749-Y40MU9JEGOUFXE1PZE1Z/aposemat1.jpg</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576164455528-7NJECTI0SJ45SOWXKKUH/Sebastian_Garcia.jpg</image:loc>
      <image:title>Aposemat Project - Sebastian García</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576164342152-JM3VB86OYV02Q4ZY738P/WhatsApp%2BImage%2B2019-08-13%2Bat%2B1.12.23%2BPM%2B%25281%2529.jpg</image:loc>
      <image:title>Aposemat Project - María José Erquiaga</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571384989037-2T8ZLO4ZVR5Z19OSCVCD/Thomas%2BO%2527Hara.jpg</image:loc>
      <image:title>Aposemat Project - Thomas O'Hara</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587037032091-5IA0JDA7R0KBP6VL3DSX/Screen+Shot+2020-04-16+at+11.03.13.png</image:loc>
      <image:title>Aposemat Project - Anna Shirokova</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581259185911-KO0HOR1ULI8YSPMBXJH0/lisandro_ubiedo.jpeg</image:loc>
      <image:title>Aposemat Project - Lisandro Ubiedo</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587036766879-GYNGV7D3HL4OJ9CY0LNB/2A0A3027-WEB.JPG</image:loc>
      <image:title>Aposemat Project - Masarah Paquet-Clouston</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571847451177-XTZX8QS2W2ABNOI04UX3/ondra-prenek.jpg</image:loc>
      <image:title>Aposemat Project - Ondřej Preněk</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1586945945549-PTZ7Y81HEHUOTTQAKQZ4/Screen+Shot+2020-04-15+at+12.17.00.png</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1586945945840-F0N3M6EPY948VU4C8FMX/Screen+Shot+2020-04-15+at+12.17.10.png</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1586945947199-9J1H87AERYXPX0AE36K7/Screen+Shot+2020-04-15+at+12.17.21.png</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1586945947377-1J8B84NC26S8K1W1MZUD/Screen+Shot+2020-04-15+at+12.17.33.png</image:loc>
      <image:title>Aposemat Project</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-iot</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571850434924-K2K6UG0QC72HEOF0GJDU/aposemat1.jpg</image:loc>
      <image:title>Aposemat Project: IoT Malware Datasets</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/job-openings</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/pocorgtfo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-04</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/ludus</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1561636558480-FDAYQLN8K5126QE9YUEW/Ludus-logo-small.png</image:loc>
      <image:title>Project Ludus: Collaborative Defense using Honeypots</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558601433904-FCYRHWOLG3GVKKW338AA/ludus_workflow.jpg</image:loc>
      <image:title>Project Ludus: Collaborative Defense using Honeypots</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/nomad</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1558628431459-J604SMTZDHO899EW2CPK/nomad.jpg</image:loc>
      <image:title>Nomad</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/thesis-projects</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-iot23</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579613341917-92NXPN8GHSHO53319UHO/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579613087928-WUXADJ8AHPXOPH4UI3NC/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579613229681-8OKSSWOREXNQX0RDG53W/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579696059713-RJYG39MJVGIIU2OA0P8W/IOT23.jpg</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579615358396-OF4R047U0ST71RQ7PZ8C/Captura+de+pantalla+de+2020-01-21+11-02-27.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
      <image:caption>Image 1: Amazon Echo device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579626006189-IXMEIMJG1E13942PKOJ1/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
      <image:caption>Image 2: Philips Hue device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579626122123-KQLRZ4VQL0DBFYAAEQ6R/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
      <image:caption>Image 3: Somfy door lock device.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579633409514-STQPQD3Q2SR76RQH1G0A/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579635449690-12KYOUEH050HMAU4SDCY/image-asset.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1620490324777-7GBV1N5OW1N3DAX7F6IZ/Screenshot+2021-05-08+at+17.17.58.png</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579639657226-NVDX437OKF2D1XQ72404/Screenshot_20200121_174544.jpg</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1579640258686-YCEOUK4AZ7EU43B1L4ON/Screenshot_20200121_175629.jpg</image:loc>
      <image:title>Aposemat Project: IoT-23 Dataset</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/polonium-in-my-iot</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1588158902913-87CW7YK7LDFYJS6L079M/Simple+Hand+Crafted+Etsy+Banner.png</image:loc>
      <image:title>Polonium in my IoT</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571848336936-Y4ATE3QQ3GIOE1T28J8A/aposemat1.jpg</image:loc>
      <image:title>Polonium in my IoT</image:title>
      <image:caption>Aposema project</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/geost-android-botnet-research</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571847875433-TXGKJN5XO9QV07AZTO84/aposemat1.jpg</image:loc>
      <image:title>Geost Android Botnet Research</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571848051415-J8FYBCSOLS27B0VGCF45/zhang1-302600a406-large.gif</image:loc>
      <image:title>Geost Android Botnet Research</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/attacker-ip-prioritization-blacklist</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587645288442-VI96BMHUW07G3PE1HWCQ/iot-3404892_1920.jpg</image:loc>
      <image:title>Attacker IP Prioritization Blacklist - AIP Algorithm</image:title>
      <image:caption>Its everywhere, and what is going to protect it?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571847623132-HEWO2HH7YIVSE4SL8KSH/aposemat1.jpg</image:loc>
      <image:title>Attacker IP Prioritization Blacklist</image:title>
      <image:caption>Apo</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587643784592-QB93854HH51CP4ZIKM6U/DeepinScreenshot_select-area_20200423140832.png</image:loc>
      <image:title>Attacker IP Prioritization Blacklist</image:title>
      <image:caption>Image 1</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587643828765-BTU7I294U1FOYSJZ7LM7/DeepinScreenshot_select-area_20200423140708.png</image:loc>
      <image:title>Attacker IP Prioritization Blacklist</image:title>
      <image:caption>Image 11</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587643855517-REM8F0RNSOOQ4YGZSDTN/DeepinScreenshot_select-area_20200423140805.png</image:loc>
      <image:title>Attacker IP Prioritization Blacklist</image:title>
      <image:caption>Image 111</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/telnet-users-profiling-and-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571847718905-D932FVZ7QPV3WKOJLFEA/aposemat1.jpg</image:loc>
      <image:title>Telnet Users Profiling and Detection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/iot-irc-malware-detection-with-ml</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571848121762-KH3S6LDTPO071OLMZDDV/aposemat1.jpg</image:loc>
      <image:title>IoT IRC Malware Detection with ML</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/iot-laboratory-honeypots</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/iot-vulnerability-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1571849052300-G08JHK5BYZOQ1Y3J0SNU/aposemat1.jpg</image:loc>
      <image:title>IoT Vulnerability Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/kalipso</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576259549669-W42359MI5PINT5H4A4FU/image4.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>Kalipso initial state - main board</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576259579634-GCQ970PV3424KZO8SPBY/image2.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>E hotkey - SrcPortClient</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576482812962-2VVR6UURNXAOSJD95792/image3.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>C hotkey - dstIPsClient</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576482991970-DJ7K2MPU958Z7OVU1VKM/image7.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>B hotkey - dstPortServer</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576483210285-H6HYMRPQH1L1IMU8HE09/image8.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>P hotkey - dstPortsClient</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576483296855-P7HDSIGSPEWUF3CKB0ZL/image6.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>N hotkey - dstPortsClientIPs</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576483381477-MPDCN8DGGPT8S09UW97L/image-asset.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>H hotkey - OutTuples</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1576483550563-JGVAKA6W13EWI0FS8VKU/image5.png</image:loc>
      <image:title>Kalipso</image:title>
      <image:caption>M hotkey - map</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/zeek-irc-feature-extractor</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580936940630-0CNNGSY82EUSXRL16OIL/zkg-logo.png</image:loc>
      <image:title>Zeek IRC Feature Extractor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580977114128-OB7WKCME45AI90EQ61PZ/irc-connection.png</image:loc>
      <image:title>Zeek IRC Feature Extractor</image:title>
      <image:caption>Figure 1. Example of IRC connection - IRC connection that is defined by source IP address 192.168.0.1, destination IP address 192.168.0.2, and destination port 440. Source port is neglected, and therefore one IRC connection can have multiple source ports. The IP addresses and ports are chosen randomly for demonstration purposes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1581002030804-K3G4ATBQF7J39092CO7L/formula_per_blackbox.png</image:loc>
      <image:title>Zeek IRC Feature Extractor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580937002036-5KZTKLQQK3DKN8USTN7P/periodicity_sketch.png</image:loc>
      <image:title>Zeek IRC Feature Extractor</image:title>
      <image:caption>Figure 2. Illustration of how message periodicity is computed. The time differences between messages and FFT output numbers are chosen randomly for demonstration purposes.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580998524096-CNWJ2FECD016CSVTTG4L/formula_entropy.gif</image:loc>
      <image:title>Zeek IRC Feature Extractor</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/zeek-anomaly-detector</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580839183487-MVP50E240OBO6AMOBOVR/Scenario14_Screenshot+2020-01-15+at+10.15.30.png</image:loc>
      <image:title>Zeek Anomaly Detector</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/should-i-click</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580813415752-0CCHJYOG4HDSDFA4ZKCW/Screenshot+2020-02-04+at+11.46.24.png</image:loc>
      <image:title>Should I Click</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580815407756-ZH6YFU8J38BFQSI9F53E/Screenshot%2B2020-02-04%2Bat%2B12.20.07.jpg</image:loc>
      <image:title>Should I Click</image:title>
      <image:caption>Example of a real Google identity verification page. We can see that the domain is accounts.google.com with a valid HTTPS certificate.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580815364785-UTFWSX6KFFPNVFYWWPHO/evil_twin_example.png</image:loc>
      <image:title>Should I Click</image:title>
      <image:caption>Example of an evil twin website attempting to imitate a Google identity verification page. However we can see that the domain is "minivale.com" and not Google Accounts.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580814993868-8CU3R8DTWP8OKKZ8VSVL/scam_1.png</image:loc>
      <image:title>Should I Click</image:title>
      <image:caption>Example of a scam website, offering a free iPhone to the user to steal his personal data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580815013867-5A65CFCJS3AQDW87QGOZ/Spotify-Giveaway-scam-survey.jpg</image:loc>
      <image:title>Should I Click</image:title>
      <image:caption>Example of a scam website, offering a Spotify code to get a free premium subscription.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/hexa-payload-decoder</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580832201148-Z2K13UICC2BWBCS3BY3I/image-asset.png</image:loc>
      <image:title>Hexa Payload Decoder</image:title>
      <image:caption>The Hexa Payload Decoder tool is able to process a pcap file and output any identified encoded strings, decoded and translated to English.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580832309042-9OCDZM8UM311LQL9Y2VS/Hexa%2BPayload%2BDecoder%2B-%2B2.png</image:loc>
      <image:title>Hexa Payload Decoder</image:title>
      <image:caption>Figure 2: Suspicious data finding at Mirai port 4441 in Wireshark and its TCP Stream. The decoded hexadecimal payload cant be read with Wireshark.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580832791445-YPMRUCYDRLDPGAWZCGR8/Hexa%2BPayload%2BDecoder%2B-%2B3.png</image:loc>
      <image:title>Hexa Payload Decoder</image:title>
      <image:caption>Figure 3: Running the Hexadecimal Decoding and Translating tool with the suspicious port 4441 TCP Stream pcap file.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1580832827382-F4PFN3H6MUQFTIX56ATF/Hexa%2BPayload%2BDecoder%2B-%2B4.png</image:loc>
      <image:title>Hexa Payload Decoder</image:title>
      <image:caption>Figure 4: Checking the results of the analysis done. The word user in Russian can be seen after the decoding and translating process.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/datasets-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-13</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/aip-tool</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1587646918080-KDIGMRSQIBIHJPTXX4PF/smart-home-4658636_1920.jpg</image:loc>
      <image:title>AIP Tool - AIP Tool</image:title>
      <image:caption>Attacker IP Prioritizer Tool</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/a-study-of-rats</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601561619845-Z1Q7480GB5F98SLEG1K3/Veronica-Valeros.jpg</image:loc>
      <image:title>A Study of RATs</image:title>
      <image:caption>Veronica Valeros, veronica.valeros@aic.fel.cvut.cz, @verovaleros</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601624812172-RGUGYOJ841SH04CJY4KQ/Timeline+1.0.jpg</image:loc>
      <image:title>A Study of RATs - Timeline 1.0</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601624859448-ZOS0HTSRNGIJDW31LNBS/Timeline+1.1.jpg</image:loc>
      <image:title>A Study of RATs - Timeline 1.1</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601624859660-BRP3CZELHOTWANWZ02RZ/Timeline+1.2.jpg</image:loc>
      <image:title>A Study of RATs - Timeline 1.2</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601624860310-GX1NAUQ6VT0S1B1R7EAI/Timeline+1.3.jpg</image:loc>
      <image:title>A Study of RATs - Timeline 1.3</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/a-study-of-iot-malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601631733951-6R4TL3BD0MYGPG7LEQQE/image-asset.jpeg</image:loc>
      <image:title>A Study of IoT Malware</image:title>
      <image:caption>Main contact: Veronica Valeros, veronica.valeros@aic.fel.cvut.cz, @verovaleros</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601631041593-4UTUELPPI2CUY9E4CUL6/IoT+Research+-+Timeline+1.0.jpg</image:loc>
      <image:title>A Study of IoT Malware - Timeline 1.0</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601631817492-XR628I4QIHBI08TBZO7N/image-asset.jpeg</image:loc>
      <image:title>A Study of IoT Malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/icarus-project</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601968558452-SL7MBEHGKOE60K1ODKQ1/logo_hubd07df05cf1faee0af1a1547178b69a4_20304_600x300_fill_catmullrom_smart1_2.png</image:loc>
      <image:title>Icarus Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601968391827-AZ8PMNWBON2HWMST7PK5/mohamed.jpeg</image:loc>
      <image:title>Icarus Project</image:title>
      <image:caption>Researcher: Mohamed Tita, OTF Fellow Site: fightcensorship.tech</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601969017613-1TAWSVVW7QQGNVMGFKLB/image.jpg</image:loc>
      <image:title>Icarus Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1601968929499-65WJ2I7XY5GN4TCLC8JF/image-asset.jpeg</image:loc>
      <image:title>Icarus Project</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/android-mischief-dataset</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1605871091259-TYR5YHMI8MWGPHE62CH8/rats.jpeg</image:loc>
      <image:title>Android Mischief Dataset</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/sebastian-garcia</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1606126689665-0ROA6C41PQHY2ABRZZ5R/Perfil-chica.jpg</image:loc>
      <image:title>Sebastian Garcia</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/veronica-valeros</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613147763056-1D76AQLLVY9RRKLDDI0Z/veronica+valeros.jpg</image:loc>
      <image:title>Veronica Valeros</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/civilsphere-aivpn</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-02-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613393031186-A0E8D1JVSQDZCDA9O53N/NLNet%2BFoundation.png</image:loc>
      <image:title>Civilsphere AI-VPN - Financially Supported by NLNET Foundation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613393278953-2DENE97WACMLCBN8N9S2/sebastian.jpg</image:loc>
      <image:title>Civilsphere AI-VPN</image:title>
      <image:caption>Assistant Professor Sebastian Garcia, PhD Sebastian Garcia is a malware researcher and security teacher with experience in applied machine learning on network traffic. He founded the Stratosphere Lab, aiming to do impactful security research to help others using machine learning. As Assistant Professor and researcher, he believes that free software and machine learning tools can help better protect users from abuse of our digital rights. He researches on machine learning for security, honeypots, malware traffic detection, social networks security detection, distributed scanning (dnmap), keystroke dynamics, fake news, Bluetooth analysis, privacy protection, intruder detection, and microphone detection with SDR (Salamandra). He taught in several Universities and worked on penetration testing for both corporations and governments. He talked in conferences such as BlackHat, Defcon Villages, Ekoparty, DeepSec, Hackitivy, Botconf, Hacklu, InBot, SecuritySessions, ECAI, CitizenLab, ArgenCon, Free Software Foundation Europe, VirusBulletin, BSides Vienna, HITB Singapore, CACIC, AAMAS, etc. He co-founded the MatesLab hackspace in Argentina and co-founded the Independent Fund for Women in Tech.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1613393260364-DX8B6VZ82E40IZUEZZHW/veronica%252Bvaleros.jpg</image:loc>
      <image:title>Civilsphere AI-VPN</image:title>
      <image:caption>Veronica Valeros, Ing. Veronica Valeros is a senior researcher and project leader at the Stratosphere Research Laboratory in the Czech Technical University in Prague. She has more than 9 years of experience in cyber security. Veronica's research strongly focuses on helping people. She currently specializes in threat intelligence, malware traffic analysis, and data analysis. She has made her career in both industry and academia. In her current position as a project leader, Veronica helps driving forward the research and development projects, improves processes, and drives the community engagement of the groups she works with. As a senior researcher, Veronica's is responsible for the research, development, and customer support at the Civilsphere project, dedicated to protecting civil society organizations and individuals at risk from targeted digital threats. Veronica has presented her research at international conferences such as Black Hat, EkoParty, Botconf, Virus Bulletin, Deepsec, and others. She is the co-founder of the MatesLab hackerspace based in Argentina and co-founder of the Independent Fund for Women in Tech.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/ad-honeypot-game</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-10-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614878983856-UAK3UQKIB68D6B2R3J4Z/elephant-4474027_1920.jpg</image:loc>
      <image:title>AD-Honeypot Evasion Game</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1614879708212-RUQD3NUQ9CR6SBXBPLGN/elephants-279505_1920.jpg</image:loc>
      <image:title>AD-Honeypot Evasion Game</image:title>
      <image:caption>This game supports the Safe the Elephants Fund.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/hornet-network-dataset-of-geographically-placed-honeypots</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-08-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1621337311091-1BYCNXV5CRE7GG7DD519/Hornet+Network+Dataset+of+Geographically+Placed+Honeypots.png</image:loc>
      <image:title>Hornet: Network Dataset of Geographically Placed Honeypots - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1628195173715-F99FFYIQ9WWCGYRKPWF4/0a4eea39-bb0c-44a1-820a-840719b4801f.png</image:loc>
      <image:title>Hornet: Network Dataset of Geographically Placed Honeypots - Make it stand out</image:title>
      <image:caption>Distribution of the number of flows per hour per scenario in logarithmic scale.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/feel-project</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1667964415836-4L1GBFMZBIORO2RII0QM/FEEL+Project+Design.jpg</image:loc>
      <image:title>FEEL Project</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/1667964160820-3H3LLVYSRO0JDE9HHUS5/FEEL+Project+Design.jpg</image:loc>
      <image:title>FEEL Project - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/gsoc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-29</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/the-blocklist-generation-project</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/6229e686-3eab-4120-b590-61ced12ef872/AIP_Diagram.png</image:loc>
      <image:title>The Blocklist Generation Project - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/defensive-llms</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-11-10</lastmod>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/projects/ai-dojo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5a01100f692ebe0459a1859f/d1f08d62-23d1-40e2-9062-c8ab131fe26f/aidojo.jpg</image:loc>
      <image:title>AI Dojo - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.stratosphereips.org/cybercrime-research</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-06</lastmod>
  </url>
</urlset>

