Essays about: "Honeypots"

Showing result 1 - 5 of 16 essays containing the word Honeypots.

  1. 1. An evaluation of Honeypots with Compliant Kubernetes

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Oscar Eriksson; [2023]
    Keywords : honeypots; Kubernetes; cloud security; compliance;

    Abstract : This thesis evaluates different honeypot technologies and how they can be integrated into Compliant Kubernetes (CK8s), a secure open-source distribution of Kubernetes designed to address various compliance and regulatory requirements. The thesis identifies and compares the features, metrics, and suitability of several candidate honeypots for CK8s based on a literature survey and experimental testing. READ MORE

  2. 2. Strategies of Honeypot Placement in Cyberspace

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Madeleine Lindström; Samuel Lavebrink; [2023]
    Keywords : ;

    Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE

  3. 3. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  4. 4. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  5. 5. A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Alexandros Marinakis; [2021]
    Keywords : IoT Devices; IoT; Honeypots;

    Abstract : IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. READ MORE