Honeypots in network security
Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many peop...
Main Authors: | , |
---|---|
Format: | Others |
Language: | English |
Published: |
Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM
2010
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600 |
id |
ndltd-UPSALLA1-oai-DiVA.org-lnu-6600 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-lnu-66002018-01-13T05:16:09ZHoneypots in network securityengAkkaya, DenizThalgott, FabienLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFMLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM2010Honeypothackingsecurityforensic analysis of honeypotsnetworkComputer SciencesDatavetenskap (datalogi)Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Honeypot hacking security forensic analysis of honeypots network Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
Honeypot hacking security forensic analysis of honeypots network Computer Sciences Datavetenskap (datalogi) Akkaya, Deniz Thalgott, Fabien Honeypots in network security |
description |
Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks. |
author |
Akkaya, Deniz Thalgott, Fabien |
author_facet |
Akkaya, Deniz Thalgott, Fabien |
author_sort |
Akkaya, Deniz |
title |
Honeypots in network security |
title_short |
Honeypots in network security |
title_full |
Honeypots in network security |
title_fullStr |
Honeypots in network security |
title_full_unstemmed |
Honeypots in network security |
title_sort |
honeypots in network security |
publisher |
Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM |
publishDate |
2010 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600 |
work_keys_str_mv |
AT akkayadeniz honeypotsinnetworksecurity AT thalgottfabien honeypotsinnetworksecurity |
_version_ |
1718609007884632064 |