Analyses of malicious software long term activity – a case study
The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru bo...
Saved in:
Main Authors: | Krzytof Cabaj, Witold Wysota, Konrad Grochowski, Piotr Gawkowski |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2024-11-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/133239/PDF/39_4812_Cabaj_sk.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Investigation on the botnets activities
by: HAN Xin-hui1, et al.
Published: (2007-01-01) -
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
by: ZHUGE Jian-wei1, et al.
Published: (2007-01-01) -
Research on the reverse analyses and monitoring data of Mirai malware botnet
by: Ya-liang CHEN, et al.
Published: (2017-08-01) -
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
by: Yadigar Imamverdiyev, et al.
Published: (2025-01-01) -
Using coverage analysis to extract Botnet command-and-control protocol
by: Zhi WANG, et al.
Published: (2014-01-01)