Essays about: "honeypot"

Showing result 1 - 5 of 15 essays containing the word honeypot.

  1. 1. Developing a modular, high-interaction honeypot using container virtualization

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Keywords : honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Abstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE

  2. 2. A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Alexandros Marinakis; [2021]
    Keywords : IoT Devices; IoT; Honeypots;

    Abstract : IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. READ MORE

  3. 3. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik; Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Felix Albinsson; Jesper Riedl; [2021]
    Keywords : Honeypot; ICS; SCADA; Conpot; T-pot;

    Abstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE

  4. 4. Less Detectable Web Scraping Techniques

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Fredric Färholt; [2021]
    Keywords : web scraping; data mining; javascript; puppeteer; algorithms; data collection; security mechanisms; honeypot; security tools; undetectability; webbskrapning; data mining; javascript; puppeteer; algoritmer; datakollektion; säkerhetsmekanismer; honeypot; säkerhetsverktyg; oupptäckbar;

    Abstract : Web scraping is an efficient way of gathering data, and it has also become much eas- ier to perform and offers a high success rate. People no longer need to be tech-savvy when scraping data since several easy-to-use platform services exist. READ MORE

  5. 5. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE