Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 25

A example of generated trial honeypot logs of an unknown hacker.

A2A3A5A7A8A9A10A11A12A13A14A15A17A19A20A22

11111100114.4211110