Author dc.contributor.author | Paráda István | |
Author dc.contributor.author | Tóth András | |
Availability Date dc.date.accessioned | 2023-03-28T11:20:50Z | |
Availability Date dc.date.available | 2023-03-28T11:20:50Z | |
Release dc.date.issued | 2022 | |
Issn dc.identifier.issn | 1788-1919 | |
uri dc.identifier.uri | http://hdl.handle.net/20.500.12944/20314 | |
Abstract dc.description.abstract | In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions are made based on the available data. On this basis, they have presented an analytical process that can help the public and defence sectors to analyse this type of attack, thus facilitating recovery processes. | |
Language dc.language | en | |
Rent dc.publisher | Ludovika Egyetemi Kiadó | |
Keywords dc.subject | Metasploit | |
Keywords dc.subject | Metasploit Framework | |
Keywords dc.subject | vsFTPd | |
Keywords dc.subject | NMAP | |
Keywords dc.subject | TCP | |
Keywords dc.subject | FTP | |
Title dc.title | Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture | |
Type dc.type | folyóiratcikk | |
Date Change dc.date.updated | 2023-03-28T09:48:14Z | |
Version dc.description.version | kiadói | |
dc.rights.accessRights | nyílt hozzáférésű | |
dc.description.notes | The research was financed by the National Research Development and Innovation Office Fund and was implemented in the funding of the Thematic Program of Excellence 2020 application program number TKP2020-NKA-09. | |
Doi ID dc.identifier.doi | 10.32567/hm.2022.4.10 | |
Discipline Discipline + dc.subject.discipline | Műszaki tudományok | |
dc.subject.sciencebranch | Műszaki tudományok/katonai műszaki tudományok | |
MTMT ID dc.identifier.mtmt | 33720443 | |
dc.identifier.journalTitle | Hadmérnök | |
dc.identifier.journalVolume | 17 | |
dc.identifier.journalIssueNumber | 4 | |
Scope dc.format.page | 153-174 | |
dc.identifier.journalAbbreviatedTitle | Hadmérnök | |
Place of publication dc.publisher.place | Budapest | |
Author institution dc.contributor.department | Katonai Műszaki Doktori Iskola | |
Author institution dc.contributor.department | Híradó Tanszék | |
Author institution dc.contributor.department | Katonai Műszaki Doktori Iskola | |
Author institution dc.contributor.department | Kiberbiztonsági Kutatóintézet | |
Author institution dc.contributor.department | Híradó Tanszék |