Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 10

Sample logs to make a prediction of an unknown hacker.

IDNameA2A3A4A22

UnknownUnknown10100