Honeypots in network security

Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many peop...

Full description

Bibliographic Details
Main Authors: Akkaya, Deniz, Thalgott, Fabien
Format: Others
Language:English
Published: Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600
id ndltd-UPSALLA1-oai-DiVA.org-lnu-6600
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-lnu-66002018-01-13T05:16:09ZHoneypots in network securityengAkkaya, DenizThalgott, FabienLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFMLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM2010Honeypothackingsecurityforensic analysis of honeypotsnetworkComputer SciencesDatavetenskap (datalogi)Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Honeypot
hacking
security
forensic analysis of honeypots
network
Computer Sciences
Datavetenskap (datalogi)
spellingShingle Honeypot
hacking
security
forensic analysis of honeypots
network
Computer Sciences
Datavetenskap (datalogi)
Akkaya, Deniz
Thalgott, Fabien
Honeypots in network security
description Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
author Akkaya, Deniz
Thalgott, Fabien
author_facet Akkaya, Deniz
Thalgott, Fabien
author_sort Akkaya, Deniz
title Honeypots in network security
title_short Honeypots in network security
title_full Honeypots in network security
title_fullStr Honeypots in network security
title_full_unstemmed Honeypots in network security
title_sort honeypots in network security
publisher Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600
work_keys_str_mv AT akkayadeniz honeypotsinnetworksecurity
AT thalgottfabien honeypotsinnetworksecurity
_version_ 1718609007884632064