Analyses of malicious software long term activity – a case study

The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru bo...

Full description

Saved in:
Bibliographic Details
Main Authors: Krzytof Cabaj, Witold Wysota, Konrad Grochowski, Piotr Gawkowski
Format: Article
Language:English
Published: Polish Academy of Sciences 2024-11-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846150800499277824
author Krzytof Cabaj
Witold Wysota
Konrad Grochowski
Piotr Gawkowski
author_facet Krzytof Cabaj
Witold Wysota
Konrad Grochowski
Piotr Gawkowski
author_sort Krzytof Cabaj
collection DOAJ
description The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results.
format Article
id doaj-art-15aa51ca97a74098b45a82e200c02fa7
institution Kabale University
issn 2081-8491
2300-1933
language English
publishDate 2024-11-01
publisher Polish Academy of Sciences
record_format Article
series International Journal of Electronics and Telecommunications
spelling doaj-art-15aa51ca97a74098b45a82e200c02fa72024-11-28T08:41:30ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332024-11-01vol. 70No 4https://doi.org/10.24425/ijet.2024.152512Analyses of malicious software long term activity – a case studyKrzytof Cabaj0Witold Wysota1Konrad Grochowski2Piotr Gawkowski3Faculty ofElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, PolandElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandThe paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results.https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdfhoneypotsdionaeamalware analysiscybersecuritysmominru botnet
spellingShingle Krzytof Cabaj
Witold Wysota
Konrad Grochowski
Piotr Gawkowski
Analyses of malicious software long term activity – a case study
International Journal of Electronics and Telecommunications
honeypots
dionaea
malware analysis
cybersecurity
smominru botnet
title Analyses of malicious software long term activity – a case study
title_full Analyses of malicious software long term activity – a case study
title_fullStr Analyses of malicious software long term activity – a case study
title_full_unstemmed Analyses of malicious software long term activity – a case study
title_short Analyses of malicious software long term activity – a case study
title_sort analyses of malicious software long term activity a case study
topic honeypots
dionaea
malware analysis
cybersecurity
smominru botnet
url https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf
work_keys_str_mv AT krzytofcabaj analysesofmalicioussoftwarelongtermactivityacasestudy
AT witoldwysota analysesofmalicioussoftwarelongtermactivityacasestudy
AT konradgrochowski analysesofmalicioussoftwarelongtermactivityacasestudy
AT piotrgawkowski analysesofmalicioussoftwarelongtermactivityacasestudy