Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
Cybersecurity is becoming more relevant throughout time. As information and technologies expand, so does the potential for it to be exploited. Computer and media have become more widespread in every modern country in the world. Unfortunately, certain community uses this opportunity to exploit the v...
Main Authors: | Zulkurnain, Nurul Fariza, Rebitanim, Azli Fitri, Abdul Malik, Noreha |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/ http://irep.iium.edu.my/68108/1/68108_Analysis%20of%20THUG.pdf http://irep.iium.edu.my/68108/7/68108_Analysis%20of%20THUG_scopus.pdf |
Similar Items
-
Malicious website detection
by: Ong, Vienna Lee
Published: (2019) -
Improved Malware detection model with Apriori Association rule and particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2019) -
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019) -
User perceptions of Islamic website (I-webs)
by: S. Abd. Aziz, Madihah, et al.
Published: (2016) -
HYBRID: an efficient unifying process to mine frequent itemsets
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)