Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 18

Hacking scenario matrix.

ā€‰Hypothesized surface features
Using prebuilt toolsSocial mediaFinancial data

Hypothesized deep featuresAuthentication/authorizationHDO
ā€‰Hiding tracksFNA