Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
نویسندگان
چکیده
This research demonstrates a design of an experiment hacker infiltrating server where it is assumed that the communication between and target established, also escalated his rights on server. Therefore, honeypot setup has been designed to reveal correlation hacker’s actions with experience, personality, expertise, psychology. To best our knowledge, such never tested rigorously implementation except for self-reporting tests applied hackers in literature. However, no study evaluates actual data these tests. provides understand personality expertise displays Our Honeypsy system composed Big-5 test, cyber capture-the-flag (CTF) event collect logs this sequence. These three steps generate psychology known hackers. The activities honeypots are obtained through CTF they have participated in. deployment honeypot, as well event, were specifically prepared research. aim predict unknown hacker's by analyzing data. By examining/analyzing hackers, now possible make predictions about same logic applies when one tries next move attacking We aimed underline details personalities thus help defense experts victimized institutions develop their strategies accordance modus operandi
منابع مشابه
Data-driven analytics for cyber-threat intelligence and information sharing
particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...
متن کاملCyber Threat Intelligence for Supporting the ATM Security Management
This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.
متن کاملCyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the developme...
متن کاملIntelFlow: Towards adding Cyber Threat Intelligence to Software Defined Networks
Security is a major concern in computer networking, which faces increasing threats as the commercial Internet and related economies continue to grow. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of Software Defined Networking (SDN). More specifically, we propose IntelFlow, an intelligence detection system for Software Defined Networking (SDN) that follows ...
متن کاملdevelopment of feminist poetics in adrienne rich
اشعار ریچ، به عنوان اشعاری که همیشه در حال تغییر و دگرگونی هستند، تجسمی از رشد و دگرگونیِ انسان هستد. پایان نامه ی حاضر، با تمرکز بر روی مراحل سیر شعری ریچ از تغییری در دنیا به عکس هایی فوری از یک عروس، سپس به شیرجه به درون کشتی شکسته و در نهایت به صبری عجیب مرا تا اینجا آورده، به بررسی این مراحل در قالب نظر شوالتر در رابطه با سه مرحله ی پیشرفت ادبی زنان یعنی مرحله ی زنانه، زن گرا و زن محور می پ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/7620125