Essays about: "Honeypots"

Showing result 6 - 10 of 16 essays containing the word Honeypots.

  1. 6. Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Michal Damian Kula; [2021]
    Keywords : IoT; Honeypots; Cyber Security; Home-Based Honeypots; Security Profiles;

    Abstract : Honeypots have been implemented in network security for years now, from the simplesystems where they could only mimic one vulnerable service and gather information aboutan intruder they have morphed in to advanced and complicated environments.Unfortunately, hackers have not left that untouched, and constantly try to detect honeypotsbefore being caught. READ MORE

  2. 7. Intrusion Attack & Anomaly Detection in IoT Using Honeypots

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linus Kulle; [2020]
    Keywords : honeypot; honeypots; iot; cyber; cybersecurity; information security; infosec; cybersec; anomaly detection; intrusion detection; iot security;

    Abstract : This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. READ MORE

  3. 8. Implementing Security Techniques to Lower the Probability of IoT-devices Getting Hacked

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Wallström; Mohammad-Ali Omer; [2019]
    Keywords : ;

    Abstract : IoT security is something that is becoming more important with the exponential growing number of IoT devices. It is important to find methods that can make IoT devices more secure and are feasible to install and use. READ MORE

  4. 9. Evaluation of Low-Interaction Honeypots on the University Network

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Austin Ponten; [2017]
    Keywords : Honeypot; Networking; Computer Security;

    Abstract : This project studies the three honeypot solutions Honeyd,Dionaea, and Kippo. Eval-uating the solutions themselves, and observing their implementation into the university campus network. READ MORE

  5. 10. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE