Dissertations / Theses on the topic 'Honeypots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Honeypots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Akkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Yahyaoui, Aymen. "Testing deceptive honeypots." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44032.
Full textDeception can be a useful defensive technique against cyber attacks. It has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. The objective of this thesis was to test the effectiveness of some honeypot tools in real networks by varying their location and virtualization, and by adding more deception to them. We tested both a web honeypot tool and an SSH honeypot tool. We deployed the web honeypot in both a residential network and at the Naval Postgraduate School network; the NPS honeypot attracted more attackers. Results also showed that the virtual honeypots received attacks from more unique IP addresses, and that adding deception to the web honeypot generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate website www.cmand.org. The traffic distributions for the web honeypot and the legitimate website showed similarities, but the SSH honeypot was different. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods.
Christoffersen, Dag, and Bengt Jonny Mauland. "Worm Detection Using Honeypots." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9454.
Full textThis thesis describes a project that utilizes honeypots to detect worms. A detailed description of existing worm detection techniques using honeypots is given, as well as a study of existing worm propagation models. Simulations using some of these worm propagation models are also conducted. Although the results of the simulations coincide with the collected data from the actual outbreak of a network worm, they also conclude that it is difficult to produce realistic results prior to a worm outbreak. A worm detection mechanism called HoneyComb is incorporated in the honeypot setup installed at NTNU, and experiments are conducted to evaluate its effectiveness and reliability. The mechanism generated a large amount of false positives in these experiments, possibly due to an error discovered in the implementation of the detection algorithm. An architecture using honeypots for detection of unknown worms is proposed. This architecture is based on a combination of two recently published systems with the extension referred to as a Known-Attack (KA) filter. By using this filter, it is believed that the amount of traffic needed to be processed by the honeypot sensors will be considerably reduced.
Bergande, Eirik Falk Georg, and Jon Fjeldberg Smedsrud. "Using Honeypots to Analyze Bots and Botnets." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9566.
Full textIn this Master thesis we will perform honeypot experiments where we allow malicious users access to systems and analyze their behaviour. Our focus will be on botnets, and how attackers progress to infect systems and add them to their botnet. Our experiments will include both high-interaction honeypots where we let attackers manually access our system, and low interaction-honeypots where we receive automated malware. The high-interaction honeypots are normal Linux distributions accessing the internet through a Honeywall that captures and controls the data flow, while the low-interaction honeypots are running the Nepenthes honeypot. Nepenthes acts by passively emulating known vulnerabilities and downloading the exploiting malware. The honeypots have been connected to both the ITEA and UNINETT networks at NTNU. The network traffic filtering on the IP addresses we have received, has been removed in order to capture more information. Installing the honeypots is a rather complicated matter, and has been described with regard to setup and configuration on both the high and low interaction honeypots. Data that is captures has been thoroughly analyzed with regard to both intent and origin. The results from the high-interaction honeypots focus on methods and techniques that the attackers are using. The low-interaction honeypot data comes from automated sources, and is primary used for code and execution analysis. By doing this, we will gain a higher degree of understanding of the botnet phenomenon, and why they are so popular amongst blackhats. During the experiments we have captures six attacks toward the high-interaction honeypots which have all been analyzed. The low-interaction honeypot, Nepenthes, has captured 56 unique malware samples and of those 14 have been analysed. In addition there has been a thorough analysis of the Rbot.
Almotairi, Saleh Ibrahim Bakr. "Using honeypots to analyse anomalous Internet activities." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/31833/1/Saleh_Almotairi_Thesis.pdf.
Full textLim, Sze Li Harry. "Assessing the effects of honeypots on cyber-attackers." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FLim%5FSze.pdf.
Full textAlosefer, Yaser. "Analysing web-based malware behaviour through client honeypots." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/29469/.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00627981.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2011. http://www.theses.fr/2011INPL037N.
Full textInformation security communities are always talking about "attackers" but in reality very little is known about their skills.In the last decade the number of attacks has increased exponentially and honeypots were introduced in order to gather information about attackers. Honeypots come in different flavors with respect to their interaction potential. Choosing the best trade-off between attacker freedom and honeypot restrictions is challenging. In this dissertation, we address the issue ofself-adaptive honeypots that can change their behavior and lure attackers into revealing as much information as possible about themselves. Rather than being allowed simply to carry out attacks, attackers are challenged by strategic interference from adaptive honeypots. The observation of the attackers' reactions is particularly interesting and, using derivedmeasurable criteria, the attacker's skills and capabilities can be assessed by the honeypot operator. We formally model the interactions of attackers with a compromised system. The key idea is to leverage game-theoretic concepts to define the configuration and reciprocal actions of high-interaction honeypots. We have also leveraged reinforcement learningmachine learning in order to arrive at the best behavior when facing attackers. Our experimental results show that behavioral strategies are dependent on contextual parameters and can serve as advanced building blocks forintelligent honeypots
Chairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Full textSalam, Haris. "Cyber Ranges: A design and implementation of Virtual Honeypots." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137108.
Full textKulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.
Full textPonten, Austin. "Evaluation of Low-Interaction Honeypots on the University Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66885.
Full textDuong, Binh T. "Comparisons of attacks on honeypots with those on real networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDuong.pdf.
Full textSteding-Jessen, Klaus. "Uso de honeypots para o estudo de spam e phishing." Instituto Nacional de Pesquisas Espaciais, 2008. http://urlib.net/sid.inpe.br/mtc-m18@80/2008/08.18.19.02.
Full textThis work presents an extensible honeypot-based infrastructure to study the spam and phishing problem in order to obtain more detailed data on it. This infrastructure allows the correlation of the former data with data captured by other sensors also based on honeypots. A prototype of this infrastructure was implemented with the aim of obtaining data about the following: abuse of open relays and open proxies, email address harvesting, pop-up spam, and the correlation of these data with spam-related activities captured by the Brazilian Honeypots Alliance. This prototype was in operation for several months and collected data on several aspects of the spam problem. This allowed the generation of metrics to help understand the spam problem in Brazil. The obtained results show the magnitude of open relays and open proxies abuse in Brazilian networks, the source and the destination of these spams, the evidence of spam being sent from infected computers, and the characteristics of email harvesting. As a result of the analysis, some mitigation techniques for the observed problems are proposed.
Semrau, Florian. "Honeypots Aufbau und Integration in ein Testnetzwerk, Analyse der Leistungsmerkmale." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/991172094/04.
Full textBarbato, Luiz Gustavo Cunha. "Monitoração de atividades em máquinas preparadas para serem comprometidas (Honeypots)." Instituto Nacional de Pesquisas Espaciais, 2004. http://urlib.net/sid.inpe.br/jeferson/2004/07.22.15.13.
Full textNot long ago, information systems security was closely associated with passive protection, always assuming a purely defensive stance. Nowadays, this approach is changing. Reactive measures are helping to improve systems security, with the use of hosts prepared to be compromised (honeypots) providing information about the techniques used by the attackers, from the attackers themselves. Based on this new approach to information systems security, the present work aims to develop a system to stealthily monitor all the attackers activities in the honeypots and transfer this information to monitoring stations.
Guerra, Pedro Henrique Calais. "Identificação e caracterização de campanhas de spam a partir de honeypots." Universidade Federal de Minas Gerais, 2009. http://hdl.handle.net/1843/BUBD-9JTMUS.
Full textEste trabalho apresenta uma metodologia para caracterização de estratégias de disseminação de spams a partir da identificação de campanhas. Para entender com profundidade como spammers abusam os recursos da rede e constróem suas mensagens, uma análise agregada das mensagens de spam não é suficiente. O agrupamento de mensagens de spam em suas respectivas campanhas permite revelar comportamentos que não poderiam ser percebidos ao considerar o conjunto de mensagens como um todo. Este trabalho propõe uma técnica para identificação de campanhas de spam baseada na construção de uma Árvore de Padrões Frequentes, capaz de capturar os invariantes no conteúdo das mensagens e detectar mensagens que diferem apenas por características ofuscadas e variadas aleatoriamente por spammers. A técnica foi capaz de agrupar um conjunto de 350 milhões de mensagens em 57.851 campanhas distintas. Em seguida, essas campanhas foram caracterizadas em termos de seus conteúdos e da forma como exploram recursos da rede. A partir da aplicação de algoritmos de mineração de regras de associação, foi possível determinar co-ocorrência de atributos das campanhas que revelam diferentes estratégias de disseminação de spams. Em particular, foram determinadas relações significativas entre a origem do spam e a forma como ele é disseminado na rede, entre sistemas operacionais e tipos de abuso e na forma como spammers encadeiam abusos entre máquinas na rede para entregar mensagens enquanto mantém anonimato. Os dados utilizados no trabalho foram coletados a partir de honeypots de baixa-interatividade que emulam proxies e relays abertos, comumente abusados por spammers. A coleta dos dados por esses emuladores estabeleceu uma visão do tráfego de spams antes que as mensagens fossem entregues aos destinatários, o que permitiu a determinação das diferentes estratégias de entrega de mensagens empregadas por spammers.
Cabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.
Full textKedrowitsch, Alexander Lee. "Deceptive Environments for Cybersecurity Defense on Low-power Devices." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86164.
Full textMaster of Science
Watkins, Trevor U. "Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.
Full textKula, Michal Damian. "Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86513.
Full textAkif, Omar Zeyad. "Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16124.
Full textFerreira, Pedro Henrique Matheus da Costa. "Análise de dados de bases de honeypots: estatística descritiva e regras de IDS." Universidade Presbiteriana Mackenzie, 2015. http://tede.mackenzie.br/jspui/handle/tede/1460.
Full textFundação de Amparo a Pesquisa do Estado de São Paulo
A honeypot is a computer security system dedicated to being probed, attacked or compromised. The information collected help in the identification of threats to computer network assets. When probed, attacked and compromised the honeypot receives a sequence of commands that are mainly intended to exploit a vulnerability of the emulated systems. This work uses data collected by honeypots to create rules and signatures for intrusion detection systems. The rules are extracted from decision trees constructed from the data sets of real honeypots. The results of experiments performed with four databases, both public and private, showed that the extraction of rules for an intrusion detection system is possible using data mining techniques, particularly decision trees. The technique pointed out similarities between the data sets, even the collection occurring in places and periods of different times. In addition to the rules obtained, the technique allows the analyst to identify problems quickly and visually, facilitating the analysis process.
Um honeypot é um sistema computacional de segurança dedicado a ser sondado, atacado ou comprometido. As informações coletadas auxiliam na identificação de ameaças computacionais aos ativos de rede. Ao ser sondado, atacado e comprometido o honeypot recebe uma sequência de comandos que têm como principal objetivo explorar uma vulnerabilidade dos sistemas emulados. Este trabalho faz uso dos dados coletados por honeypots para a criação de regras e assinaturas para sistemas de detecção de intrusão. As regras são extraídas de árvores de decisão construídas a partir dos conjuntos de dados de um honeypot real. Os resultados dos experimentos realizados com quatro bases de dados, duas públicas e duas privadas, mostraram que é possível a extração de regras para um sistema de detecção de intrusão utilizando técnicas de mineração de dados, em particular as árvores de decisão. A técnica empregada apontou similaridades entre os conjuntos de dados, mesmo a coleta ocorrendo em locais e períodos de tempos distintos. Além das regras obtidas, a técnica permite ao analista identificar problemas existentes de forma rápida e visual, facilitando o processo de análise.
Hoepers, Cristine. "Projeto e implementação de uma infra-estrutura para troca e análise de informações de honeypots e honeynets." Instituto Nacional de Pesquisas Espaciais, 2008. http://urlib.net/sid.inpe.br/mtc-m18@80/2008/08.21.12.34.
Full textPlacing sensors in unused Internet address space is one of the techniques used to characterize and monitor malicious activities. Among the diverse types of sensors, honeypots stand out. They are security resources specially configured to collect data about attacks, and whose value lies in being probed, attacked or compromised. Honeypots are able to capture valuable information about Internet attacks and to help computer security incident handling. The related work in the area of honeypots' data collection and analysis is focused on visualization or correlation of data from a unique honeynet or from a set of honeypots that use similar technologies. However, it is very important to make a more complete analysis of the traffic observed among honeypots and honeynets which use different technologies and are deployed in different parts of the world. To address the limitations in the honeypots data analysis area, and to provide interoperability among different technologies, this work presents two elements that comprise an infrastructure that allows the analysis and correlation of honeypots' data: the Honeypots Information and Data Exchange Format (HIDEF), a data format to exchange data collected by honeypots and information about the architecture and technologies used by them; and the Honeypots Information and Data Exchange and Analysis System (HIDEAS), a system that enables sending and receiving information and data represented in formats like HIDEF. To validate the data format and the system proposed a prototype was implemented. This prototype was used in a case study that correlated data from honeypots deployed with different technologies, as well as from security incident reports.
Marinakis, Alexandros. "A Systematic Comparison of Default based Versus Hardened IoT Systems Using Honeypots : Master Thesis | Supervisor: Maria Papadaki." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83187.
Full textPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Full textBarros, Eduardo Gomes de. "Uso de técnicas de análise de séries temporais para prever o comportamento do ruído de fundo na internet brasileira usando dados do consórcio brasileiro de honeypots." Instituto Nacional de Pesquisas Espaciais, 2010. http://urlib.net/sid.inpe.br/mtc-m19/2010/10.15.13.35.
Full textThe traffic captured by the sensors of the Brazilian Honeypots Alliance (CBH) reveals the existence of a traffic that exists on the Internet regardless of the type of machine or the service being provided: the background noise - all non-productive traffic, whether malicious or not. The malicious activities occurring in the Brazilian portion of the Internet are embedded in this traffic. Know it, characterize it and describe it is a challenge that will help the issue of early warnings, the security paradigm necessary for the protection of Nation's critical infrastructures and which complements the current, the reactive. From the Brazilian Honeypots Alliance data a methodology was created for data sanitization and allowing its use for constructing time series. From these series the characterization and description of the Brazilian Internet traffic was possible. The mathematical model used allows the projection of future events and the analysis of when early warnings should be issued.
OLIVEIRA, Antonio Alfredo Pires. "SAMARA SOCIEDADE DE AGENTES PARA A MONITORAÇÃO DE ATAQUES E RESPOSTAS AUTOMATIZADAS." Universidade Federal do Maranhão, 2005. http://tedebc.ufma.br:8080/jspui/handle/tede/388.
Full textThe traditional security techniques applied in computer networks try to block attacks (using firewalls) or to detect them as soon as they happen (using Intrusion Detection Systems). Both are of recognized value, however, they have limitations. In that sense, there is to innovate as for techniques and defense tactics, as well as the tools and technologies that complement the traditional mechanisms applied in network and computer security. One of these solutions have been using honeypots (networks traps) to collect information, motives, tactics and tools used in malicious network activities and distributed systems. This research work introduce an architecture for automated incident response, called SAMARA, based on honeypots and intelligent agents, created to support the functional requisites of decoy server and honeynet agents proposed for NIDIA Project Network Intrusion Detection System based on Intelligent Agents [18], but that can be adjust to others detection, prevention and reaction approaches of security incidents in network and distributed systems.
As técnicas tradicionais de segurança aplicadas em redes de computadores tentam bloquear ataques (utilizando firewalls) ou detectá- los assim que eles ocorrem (utilizando Sistemas de Detecção de Intrusos). Ambas são de reconhecido valor, porém, têm seus limites. Nesse sentido, há que se inovar em relação às técnicas e táticas de defesas, bem como em ferramentas e tecnologias que complementem os mecanismos tradicionais aplicados em segurança de redes e computadores. Uma dessas soluções tem sido o uso de honeypots (armadilhas de redes) na coleta de informações, motivos, táticas e ferramentas utilizadas em atividades maliciosas em redes e sistemas distribuídos. Este trabalho introduz a arquitetura de respostas automatizadas a incidentes de segurança, denominada SAMARA, que é baseada em honeypots e agentes inteligentes, concebida para atender os requisitos funcionais dos agentes decoy server e honeynet propostos para o Projeto NIDIA Network Intrusion Detection System based on Intelligent Agents [18], mas que pode se ajustar a outras abordagens de detecção e prevenção e reação a incidentes de segurança em redes e sistemas distribuídos.
Medeiros, Jo?o Paulo de Souza. "Identifica??o remota de sistemas operacionais utilizando an?lise de processos aleat?rios e redes neurais artificiais." Universidade Federal do Rio Grande do Norte, 2009. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15287.
Full textPetr?leo Brasileiro SA - PETROBRAS
A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network. This method has many applications related to network security. Both intrusion and defence procedures may use this process to achieve their objectives. There are many known methods that perform this process in favorable conditions. However, nowadays there are many adversities that reduce the identification performance. This work aims the creation of a new OS fingerprinting tool that bypass these actual problems. The proposed method is based on the use of attractors reconstruction and neural networks to characterize and classify pseudo-random numbers generators
? proposto um novo m?todo para identifica??o remota de sistemas operacionais que operam em redes TCP/IP. Este m?todo possui diversas aplica??es relacionadas ? seguran?a em redes de computadores e ? normalmente adotado tanto em atividades de ataque quanto de defesa de sistemas. O m?todo proposto ? capaz de obter sucesso em situa??es onde diversas solu??es atuais falham, inclusive no tratamento com dispositivos possivelmente vulner?veis ao processo de identifica??o. O novo m?todo realiza a an?lise dos geradores de n?meros aleat?rios usados nas pilhas TCP/IP e, atrav?s do uso de redes neurais artificiais, cria mapas que representam o comportamento destes geradores. Tais mapas s?o usados para compara??o com mapas rotulados que representam sistemas j? conhecidos, concretizando o processo de identifica??o
Buriánek, Adam. "Bezpečnostní technologie: Honeypot." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259876.
Full textGaletka, Josef. "Analýza síťových útoků pomocí honeypotů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237123.
Full textFairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textPepakayala, Sagar. "Contributions of honeyports to network security." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9177.
Full textA honeypot is an attractive computer target placed inside a network to lure the attackers into it. There are many advantages of this technology, like, information about attacker's tools and techniques can be fingerprinted, malicious traffic can be diverted away from the real target etc. With the increased activity from the blackhat community day by day, honeypots could be an effective weapon in the
network security administrator's armor. They have been studied rigorously during the past few years as a part of the security
industry's drive to combat malicious traffic. While the whitehats are trying to make honeypots stealthier, blackhats are coming up with techniques to identify them (therefore nullifying any
further use) or worse, use them in their favor. The game is on. The goal of this thesis is to study different architectural issues regarding honeypot deployment, various stages in utilizing honeypots like forensic analysis etc. Other concepts like IDSs and firewalls which are used in conjunction with honeypots are also discussed, because security is about cooperation among different security components. In the security industry, it is customary for whitehats to watch what blackhats are doing and vice versa. So the thesis
discusses recent techniques to defeat honeypots and risks involved in deploying honeypots. Commercial viability of honeypots and business cases for outsourcing honeypot maintenance are presented. A great interest from the security community about honeypots has propelled the research and resulted in various new and innovative applications of honeypots. Some of these applications, which made an impact, are discussed. Finally, future directions in research in honeypot technology are perused.
Krula, Jiří. "Monitorování síťových útoků pomocí systémů honeypot." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259320.
Full textŘezáč, Michal. "Honeypot pro rodinu bezdrátových komunikačních protokolů IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413089.
Full textBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Full textРусанов, Г. О., and О. І. Федюшин. "Збір та аналіз даних з мережі Honeypot." Thesis, ХНУРЕ, 2021. https://openarchive.nure.ua/handle/document/15748.
Full textJacel, Tomasz Wojciech. "Implementation of a honeypot for vehicular communications." Master's thesis, Universidade de Aveiro, 2011. http://hdl.handle.net/10773/6761.
Full textEsta dissertação descreve um estudo de viabilidade para a implementação de um software do tipo pote-de-mel (honeypot) para comunicações veículares Ad-Hoc sem fios baseadas no protocolo WAVE (Wireless Access in Vehicular Environment). Um honeypot é uma ferramenta desenhada para simular falsas redes de computadores, monitorá-los, e capturar todos os eventuais comportamentos maliciosos tais como ataques e tentativas de intrusão. O estudo da solução proposta começa com uma pesquisa de trabalho relacionado e com o estudo dos fundamentos e protocolos das comunicações veículares sem fios, nomeadamente os protocolos IEEE 802.11p e IEEE 1609.2. De seguida é feito um levantamento dos principais problemas de segurança no âmbito das comunicações veículares sem fios e procede-se a uma descrição detalhada da tecnologia de honeypots e é escolhida uma ferramente que irá ser alvo de particular atenção ao longo desta dissertação, o HONEYD. Finalmente, e dado que esta dissertação tem um caracter iminententemente teórico, são descritas as modificações que serão necessárias para adaptar o HONEYD para comunicações veículares sem fios. Isto para o caso de comunicações veículo a veículo, onde é descrita a integração do HONEYD na unidade de bordo (OBU) e para o caso de ce comunicações veículo a infraestrutura de beira de estrada, onde é proposta uma solução para integração do HONEYD na road-side-unit (RSU).
This dissertation is an attempt to implement the honeypot software into highly dynamic Vehicular Ad-hoc Network (VANET).This adhoc network is based on wireless communication between nodes according to the - WAVE (Wireless Access in Vehicular Environment) protocol. A honeypot is a tool designed to simulate fake local computer networks, monitor them, and capture all malicious behavior aimed towards them. This dissertation is in the scope of Intelligent Transportation Systems (ITS) and it provides some contributions to development of security system and hence, road safety. Honeypot solution implemented in VANET would help improve security in the network by attracting, catching and analyzing all malicious attempts to break the security system. The study of proposed solution begins with research and introduction to the main principals of vehicular communication. It is accompanied with system and wireless communication technology description. Presentation of main security issues is also provided. Honeypot software is also presented by deep in-sight look into its types, functionality, architecture, advantages and disadvantages. Via the research the one type of recent available honeypot is chosen and then deeply scrutinized on the basis of implementation into Vehicular Ad-hoc Network. Finally, since this dissertation has theoretical character, to-be changes that should be carried out to implement fully the propose solution are provided. As this work is mainly focused on tailoring and proposing necessary changes to the TCP/IP honeypot software to meet the requirements of WAVE, the hardware tests in real environment as well as creating source code will not be done and are out of scope of this dissertation. Future work should be based on programming necessary modules and putting them into life.
Poniższa praca magisterska jest próbą przystosowania programu typu honeypot do działania w mobilnych sieciach ad-hoc - VANET (Vehicular Ad-hoc Network). Sieć ta oparta jest na bezprzewodowej komunikacji pomiędzy pojazdami zgodnie ze standardem WAVE (Wireless Access in Vehicular Environment). Honeypot jest narzędziem służącym do symulowania topologii sieci komputerowej, monitorowania jej i wychwytywania wszelakich prób włamań do niej. Temat tej pracy magisterskiej mieści się w obszarze działalności stowarzyszenia ITS (Intelligent Transportation Systems). Będzie ona miała wpływ na polepszenie bezpieczeństwa w sieciach VANET i co za tym idzie bezpieczeństwa na drogach. Program honeypot wdrożony w sieciach VANET może w aktywny sposób przyczynić się do poprawienia bezpieczeństwa w sieci, poprzez przyciąganie, wychwytywanie i analizowanie wszelakich prób włamań. Praca ta zaczyna się przeglądem głównych zagadnień dotyczących bezprzewodowej komunikacji pomiędzy pojazdami w sieciach VANET. Szczególny nacisk jest kładziony na bezpieczeństwo w tych sieciach. Zaprezentowana jest również idea programu honeypot zarówno jak i jego rodzaje, funkcjonalność, architektura oraz wady i zalety. Poprzez analizę dostępnych programów służących jako honeypot, został wybrany jeden konkretny - honeyd i poddany dokładnej analizie pod kątem implementacji w sieciach VANET. Jako że ta praca magisterska ma charakter teoretyczny, jej wynikiem jest propozycja funkcjonalności i architektury urządzenia działającego jako honeypot w sieciach VANET. Zaproponowane są również zmiany którym powinien ulec software aby zapewnić pełną komunikację z nowym środowiskiem. Stworzenie kodu źródłowego odpowiadającego tym zmianom oraz testy na sprzęcie są pracą na przyszłość.
Berthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.
Full textThesis research directed by: Reliability Engineering Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Karger, David. "Moderní služby honeypot/honeynet pro klasické informační sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412981.
Full textBasam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.
Full textMaster of Science
Schoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.
Full textKubiš, Juraj. "SS7 Honeypoty - proaktivní ochrana proti podvodům v mobilních sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432453.
Full textFrederick, Erwin E. "Testing a low-interaction honeypot against live cyber attackers." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5600.
Full textThe development of honeypots as decoys designed to detect, investigate, and counterattack unauthorized use of information systems has produced an "arms race" between honeypots (computers designed solely to receive cyber attacks) and anti-honeypot technology. To test the current state of this race, we performed experiments in which we ran a small group of honeypots, using the low-interaction honeypot software Honeyd, on a network outside campus firewall protection. For 15 weeks, we ran different configurations of ports and service scripts, and simulated operating systems to check which configurations were most useful as a research honeypot and which were most useful as decoys to protect other network users. We analyzed results in order to improve the results for both purposes in subsequent weeks. We did find promising configurations for both purposes; however, good configurations for one purpose were not necessarily good for the other. We also tested the limits of Honeyd software and identified aspects of it that need to be improved. We also identified the most common attacks, most common ports used by attackers, and degree of success of decoy service scripts.
OLIVEIRA, Vladimir Bezerra de. "HoneypotLabsac: um Framework de Honeypot Virtual para o Android." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/493.
Full textFUNDAÇÃO DE AMPARO À PESQUISA DO ESTADO DO PIAUÍ
Mobile devices such as Smartphones, have become indispensable nowadays, due their increased processing power, more room for data storage, batteries with greater time autonomy, connection to wireless networks and 3G networks. . The Android Operating System is a complete platform for mobile devices principally for Smartphones developed by Google in 2008. It is gaining an increasingly global market space, due to its open-source code. Attacks on mobile phones are not a current practice. The first virtual virus called Cabir, was developed in 2004, and it is concerned only the Symbian operating system. Studies show great evolution of digital attacks to the Android operating system. Honeypots (tools that have many features such as deceive the attacker) can be quite useful in the context of network security. They make the attacker think that he is actually interacting with an operating system, but in fact the attacker is being monitored. Therefore, the present thesis is aimed to develop a Framework (framework) to generate a virtual Honeypot at the level of application for the Android operating system. The methodological procedures for the preparation of this work are the: bibliography research articles, essays and literature specific.. In this work, we show that the attacker can be monitored in mobile devices through a Honeypot generated by the framework developed here in order to be used as a tool in network security based on deception. From our experience in this study, we report some essential recommendations points for improving and expanding this work.
Os dispositivos móveis, como os Smartphones, tornaram-se indispensáveis nos dias atuais, devido ao aumento do poder de processamento, maior espaço de armazenamento de dados, baterias com maior autonomia de tempo, conexão a rede wireless e à rede 3g. O Sistema Operacional Android é uma plataforma completa para dispositivos móveis principalmente para aparelhos celulares inteligentes, desenvolvida pela Google em 2008. Ganhando nesse contexto cada vez mais espaço no mercado mundial, devido ser open-source, ou seja, código fonte aberto. Ataques a telefones celulares não é uma prática atual, o primeiro vírus virtual denominado de Cabir, foi desenvolvido em 2004, e visava exclusivamente o sistema operacional Symbiam. Estudos apresentam grande evolução de ataques digitais ao sistema operacional Android. Os Honeypots (ferramentas que dispõem de diversas funcionalidades e que tem como objetivo principal enganar o invasor) podem ser bastante úteis no âmbito de segurança de rede. Eles fazem com que o atacante pense que está interagindo de fato com um sistema operacional, mas na verdade o atacante está sendo monitorado. Neste sentido, o presente trabalho foi realizado com o objetivo de desenvolver um Framework (arcabouço) para gerar Honeypot virtual a nível de aplicação para o sistema operacional Android. Os procedimentos metodológicos para elaboração deste trabalho foram: pesquisa bibliográfica (artigos, dissertações e literaturas especificas). Conclui-se que é possível monitorar o atacante de dispositivos móveis através do Honeypot gerado pelo Framework desenvolvido, de forma a ser usado como uma ferramenta em segurança de redes baseados em iludir. Diante da experiência vivenciada neste estudo, expomos algumas recomendações, pontos imprescindíveis para melhorias do tema abordado, como: mais visibilidade ao Honeypot e ampliação para outros sistemas operacionais móveis.
Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textMOURA, Eduardo Henrique de Carvalho. "MODELO DE SEGURANÇA AUTONÔMICA PARA COMPUTAÇÃO EM NUVEM COM USO DE HONEYPOT." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/516.
Full textConselho Nacional de Desenvolvimento Científico e Tecnológico
Cloud computing is a new computing paradigm which aims to provide on-demand service. Characteristics such as scalability and availability of infinite resources have attracted many users and companies. As they come along too many malicious users who want to take advantage of this possibility of resource sharing. Also migration networks and servers for cloud means hacking techniques are now destined to cloud-based servers. Attacks can originate until even within the environment, when a virtual machine that is being performed on one of his Vlans is used to probe, capture data or insert server attacks that are instantiated in the cloud. All this combined with a difficult to administer due to the complexity of the infrastructure leaves the safety of the environment to be a critical point. The purpose of this study is to use an autonomic framework with a methodology for disappointment to propose a security model for autonomic computing clouds that assist in the security of servers and instances works against attacks from other instances.
A Computação em Nuvem é um novo paradigma da computação que visa oferecer serviço sob demanda. Suas características como escalabilidade e disponibilidade de recursos infinitos vêm atraindo muitos usuários e empresas. Junto como eles vem também muitos usuários mal intencionados que querem se aproveitar dessa possibilidade de compartilhamento de recurso. Também migração de redes e servidores para nuvem significa que técnicas de invasão estão agora destinados a servidores baseados em nuvem . Ataques podem ser originados ate mesmo dentro do ambiente, quando uma de máquina virtual que esta sendo executada em uma de suas Vlans é utilizada para sondar, capturar dados ou inserir ataques a servidores que estão instanciados na nuvem. Tudo isso aliado a uma difícil administração devido à complexidade da infraestrutura do ambiente deixa a segurança sendo um ponto critico. A proposta desse trabalho é utilizar um framework autonômico juntamente com uma metodologia de decepção para propor um modelo segurança autonômica para nuvens computacionais que auxiliem na segurança de servidores e instâncias works contra ataques oriundos de outras instâncias.
Ben, Mustapha Yosra. "Alert correlation towards an efficient response decision support." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0007/document.
Full textSecurity Information and Event Management (SIEM) systems provide the security analysts with a huge amount of alerts. Managing and analyzing such tremendous number of alerts is a challenging task for the security administrator. Alert correlation has been designed in order to alleviate this problem. Current alert correlation techniques provide the security administrator with a better description of the detected attack and a more concise view of the generated alerts. That way, it usually reduces the volume of alerts in order to support the administrator in tackling the amount of generated alerts. Unfortunately, none of these techniques consider neither the knowledge about the attacker’s behavior nor the enforcement functionalities and the defense perimeter of the protected network (Firewalls, Proxies, Intrusion Detection Systems, etc). It is still challenging to first improve the knowledge about the attacker and second to identify the policy enforcement mechanisms that are capable to process generated alerts. Several authors have proposed different alert correlation methods and techniques. Although these approaches support the administrator in processing the huge number of generated alerts, they remain limited since these solutions do not provide us with more information about the attackers’ behavior and the defender’s capability in reacting to detected attacks. In this dissertation, we propose two novel alert correlation approaches. The first approach, which we call honeypot-based alert correlation, is based on the use of knowledge about attackers collected through honeypots. The second approach, which we call enforcement-based alert correlation, is based on a policy enforcement and defender capabilities’ model