2022
DOI: 10.1155/2022/7620125
|View full text |Cite
|
Sign up to set email alerts
|

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Abstract: This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Odemis et al [ 56 ] developed a “Honeypsy” system designed to observe user behavior with CTI. The system collects and analyzes data from honeypots and decoy systems that mimic natural systems and are used to detect and monitor cyber threats.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Odemis et al [ 56 ] developed a “Honeypsy” system designed to observe user behavior with CTI. The system collects and analyzes data from honeypots and decoy systems that mimic natural systems and are used to detect and monitor cyber threats.…”
Section: Resultsmentioning
confidence: 99%
“…The Honeypsy system offers a promising approach to detecting user behavior using machine-learning algorithms and honeypot data in CTI. The system can potentially improve the accuracy and efficiency of cyber threat detection in enterprise environments, helping organizations better protect their assets and data from cyber-attacks [ 56 ].…”
Section: Resultsmentioning
confidence: 99%
“…It was discovered that the user's perishability in the various processes may be predicted by their risk-taking attitude and gender. The findings of this study and the model that was suggested can be utilized to establish a thorough framework for stopping the success of phishing efforts by addressing their underlying causes (Odemis et al, 2022).…”
Section: Phishability Traits In Human Behavior Frameworkmentioning
confidence: 96%
“…Alashti et al (2022) employed logistic regression and latent class analysis to identify risk factors associated with juvenile hacking. Odemis et al (2022) observed the behaviors of Iranian hackers via interviews. It was found that young hackers enjoyed the pleasure of cybercrime.…”
Section: Literature Reviewmentioning
confidence: 99%