Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyber Ranges: A design and implementation of Virtual Honeypots
KTH, School of Electrical Engineering (EES), Communication Networks.
2013 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. Today,Honeypots are gaining attention and the usage of these systems is increasing.Honeypots are, essentially traps, set to detect, deflect, or in some manner counteractattempts to access and use information systems. They mostly consistof a network device that appears to be part of the network, but it is actuallyseparated and monitored by security researchers continuously to review theactivities.This thesis covers the commercial design, implementation and future directionsof these systems. An introduction to the topic is given, explaining basicsecurity concepts and vulnerabilities and flaws that lead to attacks.We set-up a set of vulnerable environment and virtual routers, where thelearners could practice offensive and defensive security techniques for cyberwarfare. A simulation was created; several machines and routers were connectedtogether. Each router is deliberately set-up so that it has (security) vulnerabilities.Practitioners will be required to penetrate in those routers and systems. Theseranges are specifically designed for the defense sector and it caters the internetand network security.

Place, publisher, year, edition, pages
2013. , 32 p.
Series
EES Examensarbete / Master Thesis, XR-EE-LCN 2013:010
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-137108OAI: oai:DiVA.org:kth-137108DiVA: diva2:678009
Presentation
2013-03-20, 02:11 (English)
Supervisors
Available from: 2013-12-11 Created: 2013-12-11 Last updated: 2013-12-11Bibliographically approved

Open Access in DiVA

fulltext(549 kB)755 downloads
File information
File name FULLTEXT01.pdfFile size 549 kBChecksum SHA-512
3e822342aa422160e3545e47a400d987f877809971aa8d54ab9c5d9489cc0a8a851b19e21816a74bede337ea12493ff533e42afa377119a2489233690c406e12
Type fulltextMimetype application/pdf

By organisation
Communication Networks
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 755 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 564 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf