Analyses of malicious software long term activity - a case study

Authors

  • Krzysztof Cabaj Warsaw Univeristy of Technology
  • Witold Wysota Warsaw University of Technology
  • Konrad Grochowski Warsaw University of Technology
  • Piotr Gawkowski Warsaw University of Technology

Abstract

The paper presents the methodology, tools, and their evolution over a long lasting analyses of data collected by honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity thoughout last five years of bots belonging to Smominru botnet. Conducted analyses includes, but are not limited to, IP addresses utilised during attack scenarios, daily activities, and evolution of malicious executables distributed over the observation period. Presented results includes also behavioral analysis of the threat and attack sources. Moreover, the paper presents the systems used for data acquisition, their
modifications along the observations made, all the tools developed to achieve the analyses results presented.

Additional Files

Published

2024-10-29

Issue

Section

Applied Informatics