Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...
Saved in:
Main Authors: | Zulkurnain, Nurul Fariza, Rebitanim, Azli Fitri, Abdul Malik, Noreha |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf http://irep.iium.edu.my/68108/ https://ieeexplore.ieee.org/document/8539257 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Malicious URL classification using artificial fish swarm optimization and deep learning
by: Mustafa Hilal, Anwer, et al.
Published: (2023) -
Web threats detection using client honeypot / Mohd Khairi Mohd Nor
by: Mohd Nor, Mohd Khairi
Published: (2012) -
Algorithm to prevent and detect insider multi transaction malicious activity in database
by: Dashti Khavidaki, Seyyed Mojtaba
Published: (2013) -
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)