Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

نویسندگان

چکیده

This research demonstrates a design of an experiment hacker infiltrating server where it is assumed that the communication between and target established, also escalated his rights on server. Therefore, honeypot setup has been designed to reveal correlation hacker’s actions with experience, personality, expertise, psychology. To best our knowledge, such never tested rigorously implementation except for self-reporting tests applied hackers in literature. However, no study evaluates actual data these tests. provides understand personality expertise displays Our Honeypsy system composed Big-5 test, cyber capture-the-flag (CTF) event collect logs this sequence. These three steps generate psychology known hackers. The activities honeypots are obtained through CTF they have participated in. deployment honeypot, as well event, were specifically prepared research. aim predict unknown hacker's by analyzing data. By examining/analyzing hackers, now possible make predictions about same logic applies when one tries next move attacking We aimed underline details personalities thus help defense experts victimized institutions develop their strategies accordance modus operandi

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-driven analytics for cyber-threat intelligence and information sharing

particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...

متن کامل

Cyber Threat Intelligence for Supporting the ATM Security Management

This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.

متن کامل

Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection

Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the developme...

متن کامل

IntelFlow: Towards adding Cyber Threat Intelligence to Software Defined Networks

Security is a major concern in computer networking, which faces increasing threats as the commercial Internet and related economies continue to grow. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of Software Defined Networking (SDN). More specifically, we propose IntelFlow, an intelligence detection system for Software Defined Networking (SDN) that follows ...

متن کامل

development of feminist poetics in adrienne rich

اشعار ریچ، به عنوان اشعاری که همیشه در حال تغییر و دگرگونی هستند، تجسمی از رشد و دگرگونیِ انسان هستد. پایان نامه ی حاضر، با تمرکز بر روی مراحل سیر شعری ریچ از تغییری در دنیا به عکس هایی فوری از یک عروس، سپس به شیرجه به درون کشتی شکسته و در نهایت به صبری عجیب مرا تا اینجا آورده، به بررسی این مراحل در قالب نظر شوالتر در رابطه با سه مرحله ی پیشرفت ادبی زنان یعنی مرحله ی زنانه، زن گرا و زن محور می پ...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/7620125