<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1506554</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Testing, Verification and Validation</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Testi, Doğrulama ve Validasyon</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Analysis of Malicious Files Gathering via Honeypot Trap System and Benchmark of Anti-Virus Software</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0175-5045</contrib-id>
                                                                <name>
                                    <surname>Başer</surname>
                                    <given-names>Melike</given-names>
                                </name>
                                                                    <aff>İSTANBUL ÜNİVERSİTESİ-CERRAHPAŞA</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-7587-3127</contrib-id>
                                                                <name>
                                    <surname>Güven</surname>
                                    <given-names>Ebu Yusuf</given-names>
                                </name>
                                                                    <aff>İSTANBUL ÜNİVERSİTESİ-CERRAHPAŞA</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-1846-6090</contrib-id>
                                                                <name>
                                    <surname>Aydın</surname>
                                    <given-names>Muhammed Ali</given-names>
                                </name>
                                                                    <aff>İSTANBUL ÜNİVERSİTESİ-CERRAHPAŞA</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250107">
                    <day>01</day>
                    <month>07</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>12</volume>
                                        <issue>4</issue>
                                        <fpage>337</fpage>
                                        <lpage>348</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20240701">
                        <day>07</day>
                        <month>01</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20241122">
                        <day>11</day>
                        <month>22</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>In the age of widespread digital integration, the rise in cyber threats is evident. Cyber attackers use malicious software (malware) to compromise data and exploit system resources, employing tactics such as remote control or ransom through data encryption. Despite the common use of antivirus software with signature-based detection, this study reveals its limitations. Using a honeypot trap system on Google Cloud, suspicious files uploaded by attackers were analyzed. Results from evaluating these files with 64 antivirus programs show that relying solely on signature-based methods is insufficient. Only three programs had success rates exceeding 90\%, while the majority had success rates predominantly below 70\%. This underscores the need for diverse detection techniques alongside signature-based methods to enhance cybersecurity. The repository containing collected malicious files and the Python script is available on Github, serving as a valuable research resource for further exploration.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Malware</kwd>
                                                    <kwd>  Honeypot</kwd>
                                                    <kwd>  Antivirus Benchmark</kwd>
                                                    <kwd>  Signature-based</kwd>
                                                    <kwd>  Malware Dataset</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] G. Pitolli, G. Laurenza, L. Aniello, L. Querzoni, and R. Baldoni, “Malfamaware: automatic family identification and malware classification through online clustering,” International
Journal of information security, vol. 20, pp. 371–386, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] M. Amal and P. Venkadesh, “Review of cyber attack detection:
Honeypot system,” Webology, vol. 19, no. 1, pp. 5497–5514,
2022.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] S. COOK, “Malware statistics in 2022: Frequency, impact,
cost &amp;amp; more,” Feb 2022. [Online]. Available: https:
//www.comparitech.com/antivirus/malware-statistics-facts/</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] S. S. Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A survey
on malware analysis and mitigation techniques,” Computer
Science Review, vol. 32, pp. 1–23, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] N. Pachhala, S. Jothilakshmi, and B. P. Battula, “A comprehensive survey on identification of malware types and
malware classification using machine learning techniques,” in
2021 2nd International Conference on Smart Electronics and
Communication (ICOSEC). IEEE, 2021, pp. 1207–1214.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] C. Rohith and G. Kaur, “A comprehensive study on malware
detection and prevention techniques used by anti-virus,” in
2021 2nd International Conference on Intelligent Engineering
and Management (ICIEM). IEEE, 2021, pp. 429–434.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] K. Oosthoek and C. Doerr, “Cyber threat intelligence: A product without a process?” International Journal of Intelligence
and CounterIntelligence, vol. 34, no. 2, pp. 300–315, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] D. Aygor and E. Aktan, “The limitations of signature-based ¨
and dynamic analysis methods in detecting malwares: A case
study,” Journal of the Faculty of Engineering and Architecture
of Gazi University, vol. 37, no. 1, pp. 305–315, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] U. Inayat, M. F. Zia, F. Ali, S. M. Ali, H. M. A. Khan,
and W. Noor, “Comprehensive review of malware detection
techniques,” in 2021 International Conference on Innovative
Computing (ICIC). IEEE, 2021, pp. 1–6.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] D. Laka, “Malware: Types, analysis and classification,” Analysis and Classification (January 14, 2022), 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] E. Tekiner, A. Acar, A. S. Uluagac, E. Kirda, and A. A.
Selcuk, “Sok: cryptojacking malware,” in 2021 IEEE European
Symposium on Security and Privacy (EuroS&amp;P). IEEE, 2021,
pp. 120–139.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] S. Talukder and Z. Talukder, “A survey on malware detection
and analysis tools,” International Journal of Network Security
&amp; Its Applications (IJNSA) Vol, vol. 12, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] S. A. Roseline and S. Geetha, “A comprehensive survey of
tools and techniques mitigating computer and mobile malware
attacks,” Computers &amp; Electrical Engineering, vol. 92, p.
107143, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] S. Varlioglu, N. Elsayed, Z. ElSayed, and M. Ozer, “The
dangerous combo: Fileless malware and cryptojacking,” SoutheastCon 2022, pp. 125–132, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] T. Alsmadi and N. Alqudah, “A survey on malware detection
techniques,” in 2021 International Conference on Information
Technology (ICIT). IEEE, 2021, pp. 371–376.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] A. Chavan, K. Kerakalamatti, and S. Srivastva, “Implementation of portable antivirus system using signature-based detection and heuristic analysis,” in 2021 5th International
Conference on Trends in Electronics and Informatics (ICOEI).
IEEE, 2021, pp. 1481–1486.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] M. Botacin, M. Z. Alves, D. Oliveira, and A. Gregio, “Heaven: ´
A hardware-enhanced antivirus engine to accelerate real-time,
signature-based malware detection,” Expert Systems with Applications, vol. 201, p. 117083, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] M. J. H. Faruk, H. Shahriar, M. Valero, F. L. Barsha,
S. Sobhan, M. A. Khan, M. Whitman, A. Cuzzocrea, D. Lo,
A. Rahman et al., “Malware detection and prevention using
artificial intelligence techniques,” in 2021 IEEE International
Conference on Big Data (Big Data). IEEE, 2021, pp. 5369–
5377.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] S. M. de Lima, H. K. d. L. Silva, J. H. d. S. Luz, H. J. d. N.
Lima, S. L. d. P. Silva, A. de Andrade, and A. M. da Silva,
“Artificial intelligence-based antivirus in order to detect malware preventively,” Progress in Artificial Intelligence, vol. 10,
no. 1, pp. 1–22, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] S. Rani, K. Tripathi, Y. Arora, and A. Kumar, “Analysis of
anomaly detection of malware using knn,” in 2022 2nd International Conference on Innovative Practices in Technology
and Management (ICIPTM), vol. 2. IEEE, 2022, pp. 774–779.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] A. Katkar, S. Shukla, D. Shaikh, and P. Dange, “Malware
intrusion detection for system security,” in 2021 International
Conference on Communication information and Computing
Technology (ICCICT). IEEE, 2021, pp. 1–5.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] T. A. Assegie, “An optimized knn model for signature-based
malware detection,” Tsehay Admassu Assegie.” An Optimized
KNN Model for Signature-Based Malware Detection”. International Journal of Computer Engineering In Research Trends
(IJCERT), ISSN, pp. 2349–7084, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23] M. Zyout, R. Shatnawi, and H. Najadat, “Malware classification approaches utilizing binary and text encoding of
permissions,” International Journal of Information Security,
pp. 1–26, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24] V. Sethia and A. Jeyasekar, “Malware capturing and analysis
using dionaea honeypot,” in 2019 International Carnahan
Conference on Security Technology (ICCST). IEEE, 2019,
pp. 1–4.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25] I. M. M. Matin and B. Rahardjo, “A framework for collecting
and analysis pe malware using modern honey network (mhn),”
in 2020 8th International Conference on Cyber and IT Service
Management (CITSM). IEEE, 2020, pp. 1–5.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26] A. Kyriakou and N. Sklavos, “Container-based honeypot deployment for the analysis of malicious activity,” in 2018 Global
Information Infrastructure and Networking Symposium (GIIS).
IEEE, 2018, pp. 1–4.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27] C. Moore, “Detecting ransomware with honeypot techniques,”
in 2016 Cybersecurity and Cyberforensics Conference (CCC).
IEEE, 2016, pp. 77–81.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28] B. Wang, Y. Dou, Y. Sang, Y. Zhang, and J. Huang, “Iotcmal:
Towards a hybrid iot honeypot for capturing and analyzing
malware,” in ICC 2020-2020 IEEE International Conference
on Communications (ICC). IEEE, 2020, pp. 1–7.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29] J. Aycock, Computer viruses and malware. Springer Science
&amp; Business Media, 2006, vol. 22.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30] R. Ball, “Computer viruses, computer worms, and the selfreplication of programs,” in Viruses in all Dimensions: How
an Information Code Controls Viruses, Software and Microorganisms. Springer, 2023, pp. 73–85.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31] M. N. Alenezi, H. Alabdulrazzaq, A. A. Alshaher, and M. M.
Alkharang, “Evolution of malware threats and techniques: a
review,” International Journal of Communication Networks
and Information Security, vol. 12, no. 3, pp. 326–337, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32] “CNSSI 4009: Committee on national security systems
(cnss) glossary,” Committee on National Security Systems
(CNSS), 2015, accessed: 2024-10-28. [Online]. Available:
https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33] J. Aycock, Spyware and adware. Springer Science &amp; Business
Media, 2010, vol. 50.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34] I. Kuzminykh and M. Yevdokymenko, “Analysis of security
of rootkit detection methods,” in 2019 IEEE International
Conference on Advanced Trends in Information Theory (ATIT).
IEEE, 2019, pp. 196–199.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35] N. A. Mims, “Chapter 14 - the botnet problem,” in Computer
and Information Security Handbook (Fourth Edition), J. R.
Vacca, Ed. Morgan Kaufmann, 2025, pp. 261–272.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36] M. Swanson and B. Guttman, “NIST SP 800-12 Rev. 1:
An Introduction to Information Security,” National Institute
of Standards and Technology (NIST), Tech. Rep. 800-12
Rev. 1, 2017, accessed: 2024-10-28. [Online]. Available:
https://csrc.nist.gov/pubs/sp/800/12/r1/final</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37] A. Warikoo, “Perspective chapter: Ransomware,” in MalwareDetection and Defense. IntechOpen, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">[38] E. Salimi and N. Arastouie, “Backdoor detection system
using artificial neural network and genetic algorithm,” in 2011
International Conference on Computational and Information
Sciences, 2011, pp. 817–820.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39] H. W. Kim, “A study on countermeasures by detecting trojantype downloader/dropper malicious code,” International Journal of Advanced Culture Technology, vol. 9, no. 4, pp. 288–
294, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40] A. Damodaran, F. D. Troia, C. A. Visaggio, T. H. Austin,
and M. Stamp, “A comparison of static, dynamic, and hybrid
analysis for malware detection,” Journal of Computer Virology
and Hacking Techniques, vol. 13, no. 1, pp. 1–12, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">[41] O. A. Aslan and R. Samet, “A comprehensive review on ¨
malware detection approaches,” IEEE Access, vol. 8, pp. 6249–
6271, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">[42] Z. Bazrafshan, H. Hashemi, S. M. H. Fard, and A. Hamzeh, “A
survey on heuristic malware detection techniques,” in The 5th
Conference on Information and Knowledge Technology, 2013,
pp. 113–120.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">[43] Y. K. B. M. Yunus and S. B. Ngah, “Review of
hybrid analysis technique for malware detection,” IOP
Conference Series: Materials Science and Engineering, vol.
769, no. 1, p. 012075, feb 2020. [Online]. Available:
https://doi.org/10.1088/1757-899x/769/1/012075</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">[44] R. Sihwail, K. Omar, and K. A. Z. Ariffin, “An effective
memory analysis for malware detection and classification,”
Comput., Mater. Continua, vol. 67, no. 2, pp. 2301–2320,
2021.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">[45] K. Monnappa, Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware. Packt Publishing Ltd, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">[46] O. Or-Meir, N. Nissim, Y. Elovici, and L. Rokach, “Dynamic
malware analysis in the modern era—a state of the art survey,”
ACM Computing Surveys (CSUR), vol. 52, no. 5, pp. 1–48,
2019.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">[47] Y. K. B. M. Yunus and S. B. Ngah, “Review of hybrid analysis
technique for malware detection,” in IOP Conference Series:
Materials Science and Engineering. IOP Publishing, 2020,
p. 012075.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">[48] R. Sihwail, K. Omar, and K. Z. Ariffin, “A survey on malware
analysis techniques: Static, dynamic, hybrid and memory analysis,” Int. J. Adv. Sci. Eng. Inf. Technol, vol. 8, no. 4-2, pp.
1662–1671, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">[49] M. Bas¸er, E. Y. Guven, and M. A. Aydın, “Ssh and telnet pro- ¨
tocols attack analysis using honeypot technique:* analysis of
ssh and telnet honeypot,” in 2021 6th International Conference
on Computer Science and Engineering (UBMK). IEEE, 2021,
pp. 806–811.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">[50] R. Masri and M. Aldwairi, “Automated malicious advertisement detection using virustotal, urlvoid, and trendmicro,” in
2017 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017, pp. 336–341.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">[51] A. Salem, S. Banescu, and A. Pretschner, “Maat: Automatically analyzing virustotal for accurate labeling and effective
malware detection,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 4, pp. 1–35, 2021.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
