Cyber Ranges: A design and implementation of Virtual Honeypots
Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. Today,Honeypots are gaining attention and the usage of these systems is increasing.Honeypots are, essentially traps, set to detect, deflect, or in some manner counteractattempts to access and use information systems. They mostly consistof a network device that appears to be part of the network, but it is actuallyseparated and monitored by security researchers continuously to review theactivities.This thesis covers the commercial design, implementation and future directionsof these systems. An introduction to the topic is given, explaining basicsecurity concepts and vulnerabilities and flaws that lead to attacks.We set-up a set of vulnerable environment and virtual routers, where thelearners could practice offensive and defensive security techniques for cyberwarfare. A simulation was created; several machines and routers were connectedtogether. Each router is deliberately set-up so that it has (security) vulnerabilities.Practitioners will be required to penetrate in those routers and systems. Theseranges are specifically designed for the defense sector and it caters the internetand network security.
Place, publisher, year, edition, pages
2013. , 32 p.
EES Examensarbete / Master Thesis, XR-EE-LCN 2013:010
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-137108OAI: oai:DiVA.org:kth-137108DiVA: diva2:678009
2013-03-20, 02:11 (English)