Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali

Azali, Muhamad Rizal (2005) Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali. Degree thesis, Universiti Teknologi MARA.

Download

[thumbnail of PPb_MUHAMAD RIZAL AZALI CS 05_5 P01.pdf] Text
PPb_MUHAMAD RIZAL AZALI CS 05_5 P01.pdf

Download (105kB)

Abstract

This project is using a honeypot as a tool to detect internal network attack at Faculty of
Information Technology and Quantitative Science, (FTMSK). The purpose of this
project is to know how secure the FTMSK internal network is. Honeypots are used to
detect attack that enables the automated detection from any malicious and unknown
attack over the internal network. We classify the attack at the lecturer's computers by
using different tools of honeypots and make analysis of it. This project is used the
Windows platform as the operating system that match with the honeypots tools. We
tested and compared among of many honeypots tools and concluded that KFsensor is the
best honeypot tool. We also defined the advantages of used the different tools of the
honeypot. The research found the internal network of FTMSK is secured and if
connection made by other host will detect. This project also gave the information for
lecturers to know how secured their computers are.
IV

Metadata

Item Type: Thesis (Degree)
Creators:
Creators
Email
Azali, Muhamad Rizal
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Instruments and machines > Electronic Computers. Computer Science
Divisions: Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences
Item ID: 1695
URI: https://ir.uitm.edu.my/id/eprint/1695

Fulltext

Fulltext is available at:
  • UNSPECIFIED
  • ID Number

    1695

    Indexing


    View in Google Scholar

    Edit Item
    Edit Item