Essays about: "Honeypots"

Showing result 1 - 5 of 11 essays containing the word Honeypots.

  1. 1. A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Alexandros Marinakis; [2021]
    Keywords : IoT Devices; IoT; Honeypots;

    Abstract : IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. READ MORE

  2. 2. Intrusion Attack & Anomaly Detection in IoT Using Honeypots

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linus Kulle; [2020]
    Keywords : honeypot; honeypots; iot; cyber; cybersecurity; information security; infosec; cybersec; anomaly detection; intrusion detection; iot security;

    Abstract : This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. READ MORE

  3. 3. Implementing Security Techniques to Lower the Probability of IoT-devices Getting Hacked

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Wallström; Mohammad-Ali Omer; [2019]
    Keywords : ;

    Abstract : IoT security is something that is becoming more important with the exponential growing number of IoT devices. It is important to find methods that can make IoT devices more secure and are feasible to install and use. READ MORE

  4. 4. Evaluation of Low-Interaction Honeypots on the University Network

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Austin Ponten; [2017]
    Keywords : Honeypot; Networking; Computer Security;

    Abstract : This project studies the three honeypot solutions Honeyd,Dionaea, and Kippo. Eval-uating the solutions themselves, and observing their implementation into the university campus network. READ MORE

  5. 5. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE