Research Article
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System
Table 17
Hacking conceptual expertise scenarios.
| Hack | # | Scenario |
| Removing log files | A | Eve compromises a machine looking for tax returns and modifies log files before exiting the system | Port scanning | B | Eve downloads the automated tool to scan for open ports of visitors | Phishing | C | Eve creates an e-mail mimicking a national bank and sends it to Kelly, asking her to send an overdraft payment to another account |
|
|