Show simple item record

Author
dc.contributor.author
Paráda István
Author
dc.contributor.author
Tóth András
Availability Date
dc.date.accessioned
2023-03-28T11:20:50Z
Availability Date
dc.date.available
2023-03-28T11:20:50Z
Release
dc.date.issued
2022
Issn
dc.identifier.issn
1788-1919
uri
dc.identifier.uri
http://hdl.handle.net/20.500.12944/20314
Abstract
dc.description.abstract
In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions are made based on the available data. On this basis, they have presented an analytical process that can help the public and defence sectors to analyse this type of attack, thus facilitating recovery processes.
Language
dc.language
en
Rent
dc.publisher
Ludovika Egyetemi Kiadó
Keywords
dc.subject
Metasploit
Keywords
dc.subject
Metasploit Framework
Keywords
dc.subject
vsFTPd
Keywords
dc.subject
NMAP
Keywords
dc.subject
TCP
Keywords
dc.subject
FTP
Title
dc.title
Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture
Type
dc.type
folyóiratcikk
Date Change
dc.date.updated
2023-03-28T09:48:14Z
Version
dc.description.version
kiadói

dc.rights.accessRights
nyílt hozzáférésű

dc.description.notes
The research was financed by the National Research Development and Innovation Office Fund and was implemented in the funding of the Thematic Program of Excellence 2020 application program number TKP2020-NKA-09.
Doi ID
dc.identifier.doi
10.32567/hm.2022.4.10
Discipline Discipline +
dc.subject.discipline
Műszaki tudományok

dc.subject.sciencebranch
Műszaki tudományok/katonai műszaki tudományok
MTMT ID
dc.identifier.mtmt
33720443

dc.identifier.journalTitle
Hadmérnök

dc.identifier.journalVolume
17

dc.identifier.journalIssueNumber
4
Scope
dc.format.page
153-174

dc.identifier.journalAbbreviatedTitle
Hadmérnök
Place of publication
dc.publisher.place
Budapest
Author institution
dc.contributor.department
Katonai Műszaki Doktori Iskola
Author institution
dc.contributor.department
Híradó Tanszék
Author institution
dc.contributor.department
Katonai Műszaki Doktori Iskola
Author institution
dc.contributor.department
Kiberbiztonsági Kutatóintézet
Author institution
dc.contributor.department
Híradó Tanszék


Files in this item

Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture
 
 

This item appears in the following Collection(s)

Show simple item record

Tallózás a gyűjteményekben

Kategóriák és gyűjtemények
Megjelenés dátuma
Szerző
Cím
Tárgyszó
Feltöltés dátuma
Közszolgálati Online LexikonMagyary ArchívumLudovika Gyűjtemény