lnu.sePublikasjoner
Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Honeypots in network security
Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
2010 (engelsk)Independent thesis Basic level (degree of Bachelor), 15 poäng / 22,5 hpOppgave
Abstract [en]

Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

sted, utgiver, år, opplag, sider
2010. , s. 39
Emneord [en]
Honeypot, hacking, security, forensic analysis of honeypots, network
HSV kategori
Identifikatorer
URN: urn:nbn:se:lnu:diva-6600OAI: oai:DiVA.org:lnu-6600DiVA, id: diva2:327476
Presentation
2010-06-02, D1170, Växjö, Linneus University, 08:45 (engelsk)
Uppsök
Technology
Veileder
Examiner
Tilgjengelig fra: 2010-06-30 Laget: 2010-06-29 Sist oppdatert: 2018-01-12bibliografisk kontrollert

Open Access i DiVA

fulltekst(794 kB)11651 nedlastinger
Filinformasjon
Fil FULLTEXT01.pdfFilstørrelse 794 kBChecksum SHA-512
64ad21eff2358e3cb7926d7956c44a16a4b10ca48b0757b3f8e7e5ded9819c12365f5e04b08f08030a05dedc1e55f5da020e0deb046ac1dd6835ccc7f14b6527
Type fulltextMimetype application/pdf

Søk i DiVA

Av forfatter/redaktør
Akkaya, DenizThalgott, Fabien
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 11651 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 10138 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf