Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares

Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...

Full description

Saved in:
Bibliographic Details
Main Authors: Zulkurnain, Nurul Fariza, Rebitanim, Azli Fitri, Abdul Malik, Noreha
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2018
Subjects:
Online Access:http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf
http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf
http://irep.iium.edu.my/68108/
https://ieeexplore.ieee.org/document/8539257
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items