Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Loading...

Date
2022
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Hindawi Limited
Open Access Color
GOLD
Green Open Access
Yes
OpenAIRE Downloads
4
OpenAIRE Views
0
Publicly Funded
No
Abstract
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established and the hacker also escalated his rights on the server. Therefore the honeypot server setup has been designed to reveal the correlation of a hacker's actions with that of the hacker's experience personality expertise and psychology. To the best of our knowledge such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test a cyber expertise test and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot as well as the CTF event were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers. © 2022 Elsevier B.V. All rights reserved.
Description
Keywords
Behavioral Research, Design Of Experiments, Forecasting, Network Security, Testing, Capture The Flag, Cyber Threats, Cyber-defense, Defense Strategy, Honeypots, Modus Operandi, Personality Tests, Self-reporting, User Behaviors, Personal Computing, Behavioral research, Design of experiments, Forecasting, Network security, Testing, Capture the flag, Cyber threats, Cyber-defense, Defense strategy, Honeypots, Modus operandi, Personality tests, Self-reporting, User behaviors, Personal computing
Fields of Science
0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
6
Source
Security and Communication Networks
Volume
2022
Issue
Start Page
1
End Page
28
PlumX Metrics
Citations
Scopus : 8
Captures
Mendeley Readers : 38
SCOPUS™ Citations
8
checked on Apr 08, 2026
Web of Science™ Citations
8
checked on Apr 08, 2026
Google Scholar™


