Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares

Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...

Full description

Saved in:
Bibliographic Details
Main Authors: Zulkurnain, Nurul Fariza, Rebitanim, Azli Fitri, Abdul Malik, Noreha
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2018
Subjects:
Online Access:http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf
http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf
http://irep.iium.edu.my/68108/
https://ieeexplore.ieee.org/document/8539257
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.68108
record_format dspace
spelling my.iium.irep.681082019-08-17T03:20:51Z http://irep.iium.edu.my/68108/ Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares Zulkurnain, Nurul Fariza Rebitanim, Azli Fitri Abdul Malik, Noreha TK7885 Computer engineering Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the vulnerabilities that these computers left behind. Black hat, which is more identified as hackers and exploiters, uses the networks and servers that are commonly used to gain unauthorized information and data on the innocent victim. This work analyzes several honeypots and makes comparisons between them. Analysis has been done on the results to figure the disadvantages between each honeypot and try to improve one of the honeypots based on programming. The honeypot is deployed to simulate its effectiveness in combating cybercrime by detecting and collecting the information captured on the web browsers. IEEE 2018-11-19 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf application/pdf en http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf Zulkurnain, Nurul Fariza and Rebitanim, Azli Fitri and Abdul Malik, Noreha (2018) Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares. In: 2018 7th International Conference on Computer and Communication Engineering (ICCCE), 19th-20th September 2018, Kuala Lumpur. https://ieeexplore.ieee.org/document/8539257 10.1109/ICCCE.2018.8539257
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic TK7885 Computer engineering
spellingShingle TK7885 Computer engineering
Zulkurnain, Nurul Fariza
Rebitanim, Azli Fitri
Abdul Malik, Noreha
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
description Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the vulnerabilities that these computers left behind. Black hat, which is more identified as hackers and exploiters, uses the networks and servers that are commonly used to gain unauthorized information and data on the innocent victim. This work analyzes several honeypots and makes comparisons between them. Analysis has been done on the results to figure the disadvantages between each honeypot and try to improve one of the honeypots based on programming. The honeypot is deployed to simulate its effectiveness in combating cybercrime by detecting and collecting the information captured on the web browsers.
format Conference or Workshop Item
author Zulkurnain, Nurul Fariza
Rebitanim, Azli Fitri
Abdul Malik, Noreha
author_facet Zulkurnain, Nurul Fariza
Rebitanim, Azli Fitri
Abdul Malik, Noreha
author_sort Zulkurnain, Nurul Fariza
title Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
title_short Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
title_full Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
title_fullStr Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
title_full_unstemmed Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
title_sort analysis of thug: a low-interaction client honeypot to identify malicious websites and malwares
publisher IEEE
publishDate 2018
url http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf
http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf
http://irep.iium.edu.my/68108/
https://ieeexplore.ieee.org/document/8539257
_version_ 1643619786097164288
score 13.160551