Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Honeypots in network security
Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
Linnaeus University, Faculty of Science and Engineering, School of Computer Science, Physics and Mathematics.
2010 (English)Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
Abstract [en]

Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

Place, publisher, year, edition, pages
2010. , p. 39
Keywords [en]
Honeypot, hacking, security, forensic analysis of honeypots, network
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:lnu:diva-6600OAI: oai:DiVA.org:lnu-6600DiVA, id: diva2:327476
Presentation
2010-06-02, D1170, Växjö, Linneus University, 08:45 (English)
Uppsok
Technology
Supervisors
Examiners
Available from: 2010-06-30 Created: 2010-06-29 Last updated: 2018-01-12Bibliographically approved

Open Access in DiVA

fulltext(794 kB)11428 downloads
File information
File name FULLTEXT01.pdfFile size 794 kBChecksum SHA-512
64ad21eff2358e3cb7926d7956c44a16a4b10ca48b0757b3f8e7e5ded9819c12365f5e04b08f08030a05dedc1e55f5da020e0deb046ac1dd6835ccc7f14b6527
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Akkaya, DenizThalgott, Fabien
By organisation
School of Computer Science, Physics and Mathematics
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 11428 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 9852 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf