Essays about: "Honeypots"
Showing result 6 - 10 of 16 essays containing the word Honeypots.
-
6. Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Honeypots have been implemented in network security for years now, from the simplesystems where they could only mimic one vulnerable service and gather information aboutan intruder they have morphed in to advanced and complicated environments.Unfortunately, hackers have not left that untouched, and constantly try to detect honeypotsbefore being caught. READ MORE
-
7. Intrusion Attack & Anomaly Detection in IoT Using Honeypots
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. READ MORE
-
8. Implementing Security Techniques to Lower the Probability of IoT-devices Getting Hacked
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT security is something that is becoming more important with the exponential growing number of IoT devices. It is important to find methods that can make IoT devices more secure and are feasible to install and use. READ MORE
-
9. Evaluation of Low-Interaction Honeypots on the University Network
University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)Abstract : This project studies the three honeypot solutions Honeyd,Dionaea, and Kippo. Eval-uating the solutions themselves, and observing their implementation into the university campus network. READ MORE
-
10. Deception strategies for web application security: application-layer approaches and a testing platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE