Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Honeypots: A Force Multiplier in Educational Domain
2012 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both the hardware vendors and software developers. Over a period of time, a number of security solutions are proposed to address the known security issues. However, past experience shows that black hats (hackers/intruders) are always ahead of the security implementers. They have been successful in devising techniques to breach security parameters and steal information and/or gain access to resources. There are many commercially available tools for securing information assets like Firewalls, IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), Anti-virus, Anti-spyware, Anti-malware, etc. But they are mostly used to protect computers and networks against known/identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long time. Hence there is a need of a tool and/or solution which can be used to spy on the attacker, slowing them down and possibly deceiving them. Honeypots and related technologies exactly promise to do so.To have an insight over the concepts of information security and the tools used for securing information assets against different attacks, students of this field must have some hands-on experience over these tools as part of their curriculum. By doing so, we will enable students to work with available defense methodologies for potential exploits and threats. In this thesis we have implemented honeypot technology in an online Information Security Laboratory. Honeypots generally are decoys created to lure hackers and are closely monitored within a network to have a trail of attacks and to provide necessary alerts. The lab design adopted in our work provides a controlled environment, while keeping it accessible for both on campus and distance students. Students can use our prototype to understand honeypot technology and test it by launching different probes and attacks. We have further derived a mechanism to present the logs generated by honeypot in a user friendly and meaningful way. The adopted approach makes the process of log analysis more efficient and effective. Which otherwise could be a nightmare for analysts.

Place, publisher, year, edition, pages
2012. , p. 80
Keyword [en]
Technology
Keyword [sv]
Teknik
Identifiers
URN: urn:nbn:se:ltu:diva-59007Local ID: f8d3fca7-7dc2-43e7-be3f-e6f726abe671OAI: oai:DiVA.org:ltu-59007DiVA, id: diva2:1032395
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level
Examiners
Note
Validerat; 20121018 (anonymous)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(2090 kB)283 downloads
File information
File name FULLTEXT02.pdfFile size 2090 kBChecksum SHA-512
b8f123b50d20df849f39a5fe232a16e58509be737f988f00da7f2b7a1df387b2be09e17bd0b3748f3d93a27c449d4334ec0297ac8ba5cafc3b88dbd1e83a5608
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Fahd, MuhammadSaleh, Kaleem Ullah

Search outside of DiVA

GoogleGoogle Scholar
Total: 283 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 106 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf