Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...
| Main Authors: | , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
IEEE
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf |
| _version_ | 1848786883361898496 |
|---|---|
| author | Zulkurnain, Nurul Fariza Rebitanim, Azli Fitri Abdul Malik, Noreha |
| author_facet | Zulkurnain, Nurul Fariza Rebitanim, Azli Fitri Abdul Malik, Noreha |
| author_sort | Zulkurnain, Nurul Fariza |
| building | IIUM Repository |
| collection | Online Access |
| description | Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have
become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the vulnerabilities that these computers left behind. Black hat, which is more identified as hackers and exploiters, uses the networks and servers that are commonly used to gain unauthorized
information and data on the innocent victim. This work analyzes several honeypots and makes comparisons between them. Analysis has been done on the results to figure the disadvantages between each honeypot and try to improve one of the honeypots based on programming. The honeypot is deployed to simulate its effectiveness in combating cybercrime by detecting and collecting the information captured on the web browsers. |
| first_indexed | 2025-11-14T17:16:07Z |
| format | Proceeding Paper |
| id | iium-68108 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-14T17:16:07Z |
| publishDate | 2018 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-681082019-08-17T03:20:51Z http://irep.iium.edu.my/68108/ Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares Zulkurnain, Nurul Fariza Rebitanim, Azli Fitri Abdul Malik, Noreha TK7885 Computer engineering Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the vulnerabilities that these computers left behind. Black hat, which is more identified as hackers and exploiters, uses the networks and servers that are commonly used to gain unauthorized information and data on the innocent victim. This work analyzes several honeypots and makes comparisons between them. Analysis has been done on the results to figure the disadvantages between each honeypot and try to improve one of the honeypots based on programming. The honeypot is deployed to simulate its effectiveness in combating cybercrime by detecting and collecting the information captured on the web browsers. IEEE 2018-11-19 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf application/pdf en http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf Zulkurnain, Nurul Fariza and Rebitanim, Azli Fitri and Abdul Malik, Noreha (2018) Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares. In: 2018 7th International Conference on Computer and Communication Engineering (ICCCE), 19th-20th September 2018, Kuala Lumpur. https://ieeexplore.ieee.org/document/8539257 10.1109/ICCCE.2018.8539257 |
| spellingShingle | TK7885 Computer engineering Zulkurnain, Nurul Fariza Rebitanim, Azli Fitri Abdul Malik, Noreha Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title_full | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title_fullStr | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title_full_unstemmed | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title_short | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares |
| title_sort | analysis of thug: a low-interaction client honeypot to identify malicious websites and malwares |
| topic | TK7885 Computer engineering |
| url | http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf |