Step 1: Capturing malware from honeypots

Step 2: Analyzing system logs

Step 3: Methods of carrying out automatic tests