Suggesting a Honeypot Design to Capture Hacker Psychology- Personality and Sophistication

dc.contributor.author Murat Odemis
dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Koltuksuz
dc.contributor.author Gokhan Ozbilgin
dc.contributor.author Yucel, Cagatay
dc.contributor.author Ozbilgin, Gokhan
dc.contributor.author Odemis, Murat
dc.contributor.author Koltuksuz, Ahmet
dc.contributor.editor JS Hurley
dc.contributor.editor JQ Chen
dc.coverage.spatial 13th International Conference on Cyber Warfare and Security (ICCWS)
dc.date.accessioned 2025-10-06T16:21:11Z
dc.date.issued 2018
dc.description.abstract The benefits of collaborating across disciplines such as social sciences applied statistics and computer science primarily affect the security arena regarding the fields of open source intelligence information warfare and strategic studies of security. Computer science and psychology are becoming more and more involved with the advancements in big data analytics. Contemporary studies in this intersection show that personality traits such as neuroticism extroversion openness agreeableness and conscientiousness can be predicted through sensors logs and active user behaviors. In the security systems it is now a need for psychoanalysis to become more proactive as it plays an important role in the understanding of a cyber threat. The research question that leads the suggestions in this paper is How much can be learned from logs honeypots and collected security-related data about a hacker's psychology personality and sophistication? Hackers' traits have been investigated in the following dimensions: persistence skill greed motivation confidence and stealth. Honeypots have been designed to create a passive trap for the adversaries. This unlocks and reveals actionable information about the adversaries regarding their identities locations types of attacks they choose to use and their motivations. When a standard private honeypot server is online it will fill out its logs with many attacks from botnets and other automated malicious activities within a short time. In this mass production of logs and activities the quantity within the collection of useful information becomes unfeasible to have gathered without such a program. So far honeypots have been categorized according to their interaction levels and service types. A low-interaction honeypot emulates a few steps and replies of the vulnerable network protocol and the network stack is imitated while a high-interaction honeypot provides a full experience of the service for which it is designed. The amount of transferred data number of failed logins CPU and memory usage and the search sophistication levels are the characteristics which can be derived from a honeypot. This work-in-progress study will detail the specifications of a special type of honeypot that is designed to capture the aforementioned characteristics and sophistication of a hacker.
dc.identifier.isbn 978-1-911218-73-9
dc.identifier.isbn 9781911218739
dc.identifier.issn 2048-9870
dc.identifier.issn 2048-9889
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/6728
dc.language.iso English
dc.publisher ACAD CONFERENCES LTD
dc.relation.ispartof 13th International Conference on Cyber Warfare and Security (ICCWS)
dc.relation.ispartofseries International Conference on Cyber Warfare and Security
dc.rights info:eu-repo/semantics/closedAccess
dc.source PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018)
dc.subject a user's psychological analysis, honeypot, big five personality traits, a hackers' psychology, a hackers' profile
dc.subject BEHAVIOR
dc.subject Honeypot
dc.subject A User’s Psychological Analysis
dc.subject Big Five Personality Traits
dc.subject A Hackers’ Profile
dc.subject A Hackers’ Psychology
dc.title Suggesting a Honeypot Design to Capture Hacker Psychology- Personality and Sophistication
dc.type Conference Object
dspace.entity.type Publication
gdc.author.id Odemis, Murat/0000-0001-6733-4206
gdc.author.wosid koltuksuz, ahmet/AAJ-5658-2021
gdc.coar.type text::conference output
gdc.description.department
gdc.description.departmenttemp [Odemis, Murat] Yasar Univ, Dept Comp Engn, Izmir, Turkey; [Yucel, Cagatay; Koltuksuz, Ahmet] Yasar Univ, Izmir, Turkey; [Ozbilgin, Gokhan] Havelsan Inc, Ankara, Turkey
gdc.description.endpage 438
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 432
gdc.description.woscitationindex Conference Proceedings Citation Index - Science
gdc.identifier.wos WOS:000560053500052
gdc.index.type WoS
gdc.wos.citedcount 3
oaire.citation.endPage 438
oaire.citation.startPage 432
person.identifier.orcid Odemis- Murat/0000-0001-6733-4206,
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files