<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-025-11-1417</article-id>
      <article-id pub-id-type="publisher-id">22670</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>D.4.6 - Security and Protection</subject>
          <subject>I.5.3 - Clustering</subject>
          <subject>K.6.5 - Security and Protection</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Analysis of the Infection and the Injection Phases of the Telnet Botnets</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Bajtoš</surname>
            <given-names>Tomáš</given-names>
          </name>
          <email xlink:type="simple">tomas.bajtos@upjs.sk</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Sokol</surname>
            <given-names>Pavol</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Gajdoš</surname>
            <given-names>Andrej</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Lučivjanská</surname>
            <given-names>Katarína</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Mézešová</surname>
            <given-names>Terézia</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Pavol Jozef Šafárik University, Košice, Slovakia</addr-line>
        <institution>Pavol Jozef Šafárik University</institution>
        <addr-line content-type="city">Košice</addr-line>
        <country>Slovakia</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Tomáš Bajtoš (<email xlink:type="simple">tomas.bajtos@upjs.sk</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2019</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>11</month>
        <year>2019</year>
      </pub-date>
      <volume>25</volume>
      <issue>11</issue>
      <fpage>1417</fpage>
      <lpage>1436</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/324CFF29-7690-5D96-8D1F-0739B7726D1E">324CFF29-7690-5D96-8D1F-0739B7726D1E</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/4840920">4840920</uri>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>02</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>07</month>
          <year>2019</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Tomáš Bajtoš, Pavol Sokol, Andrej Gajdoš, Katarína Lučivjanská, Terézia Mézešová</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet increases. These devices can become part of botnets and cause damage to the Internet infrastructure. In this paper we study telnet botnets and their behaviour in the first two stages of its lifecycle - initial infection, and secondary infection. The main objective of this paper is to determine specific attributes of their behavior during these stages and design a model for profiling threat agents into telnet botnets groups. We implemented a telnet honeynet and analyzed collected data. Also, we applied clustering methods for security incident profiling. We consider K-modes and PAM clustering algorithms. We found out that a number of sessions and credential guessing are easily collected and United States of Americable attributes for threat agents profiling.</p>
      </abstract>
    </article-meta>
  </front>
</article>
