Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...
| Main Authors: | Zulkurnain, Nurul Fariza, Rebitanim, Azli Fitri, Abdul Malik, Noreha |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
IEEE
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf |
Similar Items
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019)
by: Zulkurnain, Nurul Fariza
Published: (2019)
The campaign against thugs in the Bengal press of the 1830s
by: ní Fhlathúin, Máire
Published: (2004)
by: ní Fhlathúin, Máire
Published: (2004)
HYBRID: an efficient unifying process to mine frequent itemsets
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
The travels of M. de Thévenot through the thug archive
by: ní Fhlathúin, Máire
Published: (2001)
by: ní Fhlathúin, Máire
Published: (2001)
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)
by: Amran, Salleh
Published: (2005)
RARE: mining colossal closed itemset in high dimensional data
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
Improved Malware detection model with Apriori Association rule and particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2019)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2019)
User perceptions of Islamic website (I-webs)
by: S. Abd. Aziz, Madihah, et al.
Published: (2016)
by: S. Abd. Aziz, Madihah, et al.
Published: (2016)
An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares / Saman Mirza Abdulla
by: Abdulla, Saman Mirza
Published: (2012)
by: Abdulla, Saman Mirza
Published: (2012)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Network Isolation and Security Using Honeypot
by: Foo, Ce Sheng
Published: (2019)
by: Foo, Ce Sheng
Published: (2019)
Staging criminality and colonial authority: the execution of thug criminals in British India
by: ní Fhlathúin, Máire
Published: (2010)
by: ní Fhlathúin, Máire
Published: (2010)
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Distinctive features for classification of respiratory sounds between normal and crackles using cepstral coefficients
by: Mohd Johari, Nabila Husna, et al.
Published: (2018)
by: Mohd Johari, Nabila Husna, et al.
Published: (2018)
Distinctive features for normal and crackles respiratory sounds using cepstral coefficients
by: Mohd Johari, Nabila Husna, et al.
Published: (2019)
by: Mohd Johari, Nabila Husna, et al.
Published: (2019)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Development of lie detector using photoplethysmogram signal
by: Shariff, Nur Amirah, et al.
Published: (2019)
by: Shariff, Nur Amirah, et al.
Published: (2019)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Electrocardiogram identification: Use a simple set of features in QRS complex to identify individuals
by: , Tuerxunwaili, et al.
Published: (2016)
by: , Tuerxunwaili, et al.
Published: (2016)
DisClose: Discovering colossal closed itemsets via a memory efficient compact row-tree
by: Zulkurnain , N.F., et al.
Published: (2013)
by: Zulkurnain , N.F., et al.
Published: (2013)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Simple and efficient multibiometric technique for subject recognition using multilead electrocardiogram signal
by: Sidek, Khairul Azami, et al.
Published: (2013)
by: Sidek, Khairul Azami, et al.
Published: (2013)
Web based water turbidity monitoring and automated filtration system: IoT application in water management
by: Ibrahim, Siti Noorjannah, et al.
Published: (2018)
by: Ibrahim, Siti Noorjannah, et al.
Published: (2018)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Malicious software prevention for Muslim communities
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi
Published: (2012)
Profiling delay and throughput characteristics of interactive multimedia traffic over WLANs using OPNET
by: Abdul Latif, Suhaimi, et al.
Published: (2007)
by: Abdul Latif, Suhaimi, et al.
Published: (2007)
HRI for interactive humanoid head Amir-II for visual tracking
and servoing of human face.
by: Iqbal, Aseef, et al.
Published: (2011)
by: Iqbal, Aseef, et al.
Published: (2011)
Helping Client to Rise Above the Impact of An Abusive Relationship-Identifying Patterned Behaviour in Culturally Diverse Clients
by: Monique, Toohey
Published: (2014)
by: Monique, Toohey
Published: (2014)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
The tripartite efficacy framework in client–therapist rehabilitation interactions: implications for relationship quality and client engagement
by: Jackson, B., et al.
Published: (2012)
by: Jackson, B., et al.
Published: (2012)
Similar Items
-
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019) -
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019) -
The campaign against thugs in the Bengal press of the 1830s
by: ní Fhlathúin, Máire
Published: (2004)