2023
DOI: 10.21203/rs.3.rs-3733937/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software

Melike BASER,
Ebu Yusuf GUVEN,
Muhammed Ali AYDIN

Abstract: In an era dominated by the pervasive integration of digital technologies, the surge in cyber threats is increasingly conspicuous. Cyber attackers employ malicious software (Malware) to compromise data integrity and exploit system resources. Tactics include transforming devices into remotely controlled assets or extorting ransom through data encryption. While end users commonly resort to antivirus software with signature-based detection, the protracted and dangered of malware detection necessitates alternative … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 33 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?