@ARTICLE{Cabaj_Krzytof_Analyses_2024, author={Cabaj, Krzytof and Wysota, Witold and Grochowski, Konrad and Gawkowski, Piotr}, volume={vol. 70}, number={No 4}, journal={International Journal of Electronics and Telecommunications}, pages={1099–1104}, howpublished={online}, year={2024}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={The paper describes the approach, instruments, and their evolution over a prolonged investigation of data collected by a honeypot system. The data is focused on network activity of a cybersecurity threat, in particular, attacks and activity throughout last five years of bots belonging to Smominru botnet. Conducted analyses include, but are not limited to, IP addresses used during attacks, day by day activity and evolution of malicious executables distributed over the observation period. The presented results also contain behavioural analysis of the threat and attack sources. Moreover, the paper details the systems used for data acquisition, their modifications along the observations made and all the tools developed to achieve the results.}, type={Article}, title={Analyses of malicious software long term activity – a case study}, URL={http://czasopisma.pan.pl/Content/133239/PDF-MASTER/39_4812_Cabaj_sk.pdf}, doi={10.24425/ijet.2024.152512}, keywords={HoneyPots, Dionaea, malware analysis, cybersecurity, Smominru botnet}, }