Analyses of malicious software long term activity – a case study

The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru bo...

Full description

Saved in:
Bibliographic Details
Main Authors: Krzytof Cabaj, Witold Wysota, Konrad Grochowski, Piotr Gawkowski
Format: Article
Language:English
Published: Polish Academy of Sciences 2024-11-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!