Essays about: "honeypot thesis"
Showing result 1 - 5 of 11 essays containing the words honeypot thesis.
-
1. An evaluation of Honeypots with Compliant Kubernetes
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : This thesis evaluates different honeypot technologies and how they can be integrated into Compliant Kubernetes (CK8s), a secure open-source distribution of Kubernetes designed to address various compliance and regulatory requirements. The thesis identifies and compares the features, metrics, and suitability of several candidate honeypots for CK8s based on a literature survey and experimental testing. READ MORE
-
2. Honeypot study of threats targeting critical infrastructure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE
-
3. A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. READ MORE
-
4. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE
-
5. Intrusion Attack & Anomaly Detection in IoT Using Honeypots
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. READ MORE