Analyses of malicious software long term activity – a case study
The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru bo...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Polish Academy of Sciences
2024-11-01
|
| Series: | International Journal of Electronics and Telecommunications |
| Subjects: | |
| Online Access: | https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846150800499277824 |
|---|---|
| author | Krzytof Cabaj Witold Wysota Konrad Grochowski Piotr Gawkowski |
| author_facet | Krzytof Cabaj Witold Wysota Konrad Grochowski Piotr Gawkowski |
| author_sort | Krzytof Cabaj |
| collection | DOAJ |
| description | The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results. |
| format | Article |
| id | doaj-art-15aa51ca97a74098b45a82e200c02fa7 |
| institution | Kabale University |
| issn | 2081-8491 2300-1933 |
| language | English |
| publishDate | 2024-11-01 |
| publisher | Polish Academy of Sciences |
| record_format | Article |
| series | International Journal of Electronics and Telecommunications |
| spelling | doaj-art-15aa51ca97a74098b45a82e200c02fa72024-11-28T08:41:30ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332024-11-01vol. 70No 4https://doi.org/10.24425/ijet.2024.152512Analyses of malicious software long term activity – a case studyKrzytof Cabaj0Witold Wysota1Konrad Grochowski2Piotr Gawkowski3Faculty ofElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, PolandElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandElectronics and Information Technology, Warsaw University of Technology, Warsaw, PolandThe paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results.https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdfhoneypotsdionaeamalware analysiscybersecuritysmominru botnet |
| spellingShingle | Krzytof Cabaj Witold Wysota Konrad Grochowski Piotr Gawkowski Analyses of malicious software long term activity – a case study International Journal of Electronics and Telecommunications honeypots dionaea malware analysis cybersecurity smominru botnet |
| title | Analyses of malicious software long term activity – a case study |
| title_full | Analyses of malicious software long term activity – a case study |
| title_fullStr | Analyses of malicious software long term activity – a case study |
| title_full_unstemmed | Analyses of malicious software long term activity – a case study |
| title_short | Analyses of malicious software long term activity – a case study |
| title_sort | analyses of malicious software long term activity a case study |
| topic | honeypots dionaea malware analysis cybersecurity smominru botnet |
| url | https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf |
| work_keys_str_mv | AT krzytofcabaj analysesofmalicioussoftwarelongtermactivityacasestudy AT witoldwysota analysesofmalicioussoftwarelongtermactivityacasestudy AT konradgrochowski analysesofmalicioussoftwarelongtermactivityacasestudy AT piotrgawkowski analysesofmalicioussoftwarelongtermactivityacasestudy |