Abstract
Internet and network computer has become a common work environment for user and companies. The internet connects millions of computers provide a global communication. This global connectivity among open system is very important because of the availability of the services and resources for the users. Most of the computing devices store and transmit information between the users such as web pages, email, video conference, online banking and e-government. Any computers that become part of the network environment have faced some major problems or risk that can give some impact for the computer system. Protection of any risk launched over networks is probably the most aspect of computer security. Thus, security must be a vital policy for users and organization since most commonly attack launched because of the vulnerability opportunity exploitation of the system. The objective of this project is to analyze any kind of attack that has occurred in the client system using the deployment of the client honeypot and generate a report based on the attacks that have been detected. This project uses the client honeypot which are Capture HPC, Shelia, Web Exploit Finder, SpyBye and PhoneyC. As a result of this project, the client honeypot successfully analyze and determine whether the web server is malicious or clean. It is hope this project will give benefits to all students and especially for the network administrator in order to monitor and prevent from malware exploitation.
Metadata
Item Type: | Thesis (Degree) |
---|---|
Creators: | Creators Email / ID Num. Mohd Nor, Mohd Khairi 2008777631 |
Contributors: | Contribution Name Email / ID Num. Thesis advisor Othman, Abdul Hamid UNSPECIFIED |
Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > World Wide Web. Web portals. Web site development |
Divisions: | Universiti Teknologi MARA, Shah Alam > Faculty of Computer and Mathematical Sciences |
Programme: | Bachelor of Science (Hons.) Netcentric Computing |
Keywords: | Networks security, client system, client honeypot |
Date: | 2012 |
URI: | https://ir.uitm.edu.my/id/eprint/63225 |
Download
63225.pdf
Download (108kB)