Essays about: "Honeypots"

Showing result 11 - 15 of 16 essays containing the word Honeypots.

  1. 11. Cyber Ranges: A design and implementation of Virtual Honeypots

    University essay from KTH/Kommunikationsnät

    Author : Haris Salam; [2013]
    Keywords : ;

    Abstract : Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. READ MORE

  2. 12. Deployment of Low Interaction Honeypots in University Campus Network

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Eleftherios Chairetakis; Bassam Alkudhir; Panagiotis Mystridis; [2013]
    Keywords : low interaction honeypots; deception; university campus network; network attacks;

    Abstract : Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as new tools and techniques are being constantly developed by hackers. READ MORE

  3. 13. Identifiering och analys av botnät med hjälp av aktiva säkerhetssystem

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Pawel Mynarski; Oscar Carlsson; [2012]
    Keywords : botnät; honeypot; sandbox;

    Abstract : Botnät är idag ett växande hot mot IT-säkerhet. Myndigheter, företag och stora organisationer utsätts dagligen för olika typer av attacker orsakade av botnät och rapporter i media redogör för endast en bråkdel av incidenter som inträffar på Internet. READ MORE

  4. 14. Honeypots in network security

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Deniz Akkaya; Fabien Thalgott; [2010]
    Keywords : Honeypot; hacking; security; forensic analysis of honeypots; network;

    Abstract : Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. READ MORE

  5. 15. Client-side threats and a honeyclient-based defense mechanism, Honeyscout

    University essay from Institutionen för systemteknik

    Author : Christian Clementson; [2009]
    Keywords : Client security; network security; malware; virus; honeypot; honeyclient; capture-hpc; monkey-spider; honeyscout;

    Abstract : Client-side computers connected to the Internet today are exposed to a lot malicious activity. Browsing the web can easily result in malware infection even if the user only visits well known and trusted sites. Attackers use website vulnerabilities and ad-networks to expose their malicious code to a large user base. READ MORE