Analyses of malicious software long term activity - a case study

被引:0
|
作者
Cabaj, Krzytof [1 ]
Wysota, Witold [1 ]
Grochowski, Konrad [1 ]
Gawkowski, Piotr [1 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
-HoneyPots; Dionaea; malware analysis; cybersecu-; rity; Smominru botnet;
D O I
10.24425/ijet.2024.152512
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
the paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results.
引用
收藏
页码:1099 / 1104
页数:6
相关论文
共 50 条
  • [1] A case study on the long-term effects of software redocumentation
    Rostkowycz, AJ
    Rajlich, V
    Marcus, A
    20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2004, : 92 - 101
  • [2] Identifying Malicious Software Using Deep Residual Long-Short Term Memory
    Alotaibi, Aziz
    IEEE ACCESS, 2019, 7 : 163128 - 163137
  • [3] Exploring the Long Tail of (Malicious) Software Downloads
    Rahbarinia, Babak
    Balduzzi, Marco
    Perdisci, Roberto
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 391 - 402
  • [4] Conducting a Long-Term Case Study in a Software Firm: An Experience Report
    Sherman, Sofia
    Hadar, Irit
    2013 1ST INTERNATIONAL WORKSHOP ON CONDUCTING EMPIRICAL STUDIES IN INDUSTRY (CESI), 2013, : 47 - 50
  • [5] Malicious software and system damages: Is there a case for liability of software vendors?
    Tryfonas, Theodore
    Owen, Paul
    Thomas, Paula
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 281 - 290
  • [6] Statistical and trend analyses of long-term rainfall data: a case study for Mauritius
    Seebocus, Reena Hansa
    Lollchund, Michel Roddy
    Bessafi, Miloud
    INTERNATIONAL JOURNAL OF HYDROLOGY SCIENCE AND TECHNOLOGY, 2020, 10 (05) : 413 - 428
  • [7] TANGIBLE LONG-TERM ASSET ACCOUNTING SOFTWARE SELECTION IN UKRAINE: CASE STUDY
    Derun, Ivan
    MANAGEMENT THEORY AND STUDIES FOR RURAL BUSINESS AND INFRASTRUCTURE DEVELOPMENT, 2013, 35 (02): : 194 - 207
  • [8] Challenges of UX research and long-term UX: A multiple case study with software startups
    Martinelli, Suellen
    da Silva, Tiago Silva
    Zaina, Luciana
    PROCEEDINGS OF THE 13TH NORDIC CONFERENCE ON HUMAN-COMPUTER INTERACTION, NORDICHI 2024, 2024,
  • [9] A Measurement Study on Interprocess Code Propagation of Malicious Software
    Jenke, Thorsten
    Liessem, Simon
    Padilla, Elmar
    Bruckschen, Lilli
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 264 - 282
  • [10] AceTree: a major update and case study in the long term maintenance of open-source scientific software
    Katzman, Braden
    Tang, Doris
    Santella, Anthony
    Bao, Zhirong
    BMC BIOINFORMATICS, 2018, 19