Abstract
Honeypots are computers that attract attackers to penetrate itself. They are security tools for monitor and identify unauthorized activity. The value of Honeypots is in being hacked. They don‟t have any data, so any traffic to or from them is most unauthorized activity. In fact Honeypots are computers or networks trap, designed to attract and detect malicious attacks. The main goal of this paper is to point out the well known characteristics of Honeypots based on windows platform, design an environment which will allow us to test these characteristics and discuss the results. An implementation of such environment will be tested and analyzed. This work gives a good idea to collect data and the logs which are retrieved and stored in a database for further analysis.
Metadata
Item Type: | Thesis (Masters) |
---|---|
Creators: | Creators Email / ID Num. Raayatiezhad, Asma 2009428184 |
Contributors: | Contribution Name Email / ID Num. Thesis advisor Ahmad, Adnan UNSPECIFIED |
Subjects: | Q Science > QA Mathematics > Computers and civilization. Social aspects of computers. Hackers |
Divisions: | Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences |
Programme: | Master of Science (Computer Networking) |
Keywords: | Honeypots, hackers, intrusion detection |
Date: | 2011 |
URI: | https://ir.uitm.edu.my/id/eprint/110698 |
Download
![[thumbnail of 110698.pdf]](https://ir.uitm.edu.my/style/images/fileicons/text.png)
110698.pdf
Download (230kB)
Digital Copy

Physical Copy
ID Number
110698
Indexing

