Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 6

Honeypot logs of known participants.

IDNameA2A3A4A5A6A7A11A12A14

1Joe H.101001010.4
2Che N.000001110.3
100Kol X.011101010.4