Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali

Azali, Muhamad Rizal (2005) Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali. Degree thesis, Universiti Teknologi MARA.

[img] Text
PPb_MUHAMAD RIZAL AZALI CS 05_5 P01.pdf

Download (105kB)

Abstract

This project is using a honeypot as a tool to detect internal network attack at Faculty of Information Technology and Quantitative Science, (FTMSK). The purpose of this project is to know how secure the FTMSK internal network is. Honeypots are used to detect attack that enables the automated detection from any malicious and unknown attack over the internal network. We classify the attack at the lecturer's computers by using different tools of honeypots and make analysis of it. This project is used the Windows platform as the operating system that match with the honeypots tools. We tested and compared among of many honeypots tools and concluded that KFsensor is the best honeypot tool. We also defined the advantages of used the different tools of the honeypot. The research found the internal network of FTMSK is secured and if connection made by other host will detect. This project also gave the information for lecturers to know how secured their computers are. IV

Item Type: Thesis (Degree)
Creators:
CreatorsEmail
Azali, Muhamad RizalUNSPECIFIED
Subjects: Q Science > QA Mathematics > Instruments and machines > Electronic computers. Computer science
Q Science > QA Mathematics > Instruments and machines > Electronic computers. Computer science
Divisions: Faculty of Information Technology and Quantitative Sciences
Item ID: 1695
Last Modified: 22 Jul 2019 02:51
Depositing User: Staf Pendigitalan 1
URI: http://ir.uitm.edu.my/id/eprint/1695

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year