Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 17

Hacking conceptual expertise scenarios.

Hack#Scenario

Removing log filesAEve compromises a machine looking for tax returns and modifies log files before exiting the system
Port scanningBEve downloads the automated tool to scan for open ports of visitors
PhishingCEve creates an e-mail mimicking a national bank and sends it to Kelly, asking her to send an overdraft payment to another account