Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

dc.contributor.author Murat Odemis
dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Koltuksuz
dc.date JAN 27
dc.date.accessioned 2025-10-06T16:22:15Z
dc.date.issued 2022
dc.description.abstract This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established and the hacker also escalated his rights on the server. Therefore the honeypot server setup has been designed to reveal the correlation of a hacker's actions with that of the hacker's experience personality expertise and psychology. To the best of our knowledge such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test a cyber expertise test and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot as well as the CTF event were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
dc.identifier.doi 10.1155/2022/7620125
dc.identifier.issn 1939-0114
dc.identifier.issn 1939-0122
dc.identifier.uri http://dx.doi.org/10.1155/2022/7620125
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/7299
dc.language.iso English
dc.publisher WILEY-HINDAWI
dc.relation.ispartof Security and Communication Networks
dc.source SECURITY AND COMMUNICATION NETWORKS
dc.subject SECURITY
dc.title Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
dc.type Article
dspace.entity.type Publication
gdc.bip.impulseclass C4
gdc.bip.influenceclass C5
gdc.bip.popularityclass C4
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial false
gdc.description.endpage 28
gdc.description.startpage 1
gdc.description.volume 2022
gdc.identifier.openalex W4210488927
gdc.index.type WoS
gdc.oaire.accesstype GOLD
gdc.oaire.diamondjournal false
gdc.oaire.downloads 4
gdc.oaire.impulse 6.0
gdc.oaire.influence 2.7600309E-9
gdc.oaire.isgreen true
gdc.oaire.popularity 6.3153855E-9
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.views 0
gdc.openalex.collaboration International
gdc.openalex.fwci 1.1418
gdc.openalex.normalizedpercentile 0.78
gdc.opencitations.count 6
gdc.plumx.mendeley 38
gdc.plumx.newscount 4
gdc.plumx.scopuscites 8
person.identifier.orcid Yucel- Cagatay/0000-0002-4901-5954, Koltuksuz- Ahmet Hasan/0000-0002-2205-6238
project.funder.name European Union [830943]
publicationvolume.volumeNumber 2022
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files