Detecting network attacks using virtual honeynet technology / Fairuzan Roslan
Traditionally, information security has been purely defensive. Firewalls, Intrusion Detection Systems, encryption; all of these mechanisms are used defensively to protect one's resources. One of the greatest problems the security community faces is lack of information on the attacker. This is o...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2004
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/63204/1/63204.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.63204 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.632042023-01-04T08:07:38Z Detecting network attacks using virtual honeynet technology / Fairuzan Roslan 2004 Roslan, Fairuzan Computer networks. General works. Traffic monitoring Traditionally, information security has been purely defensive. Firewalls, Intrusion Detection Systems, encryption; all of these mechanisms are used defensively to protect one's resources. One of the greatest problems the security community faces is lack of information on the attacker. This is one of the main reasons why the computer crime and network attacks are still increasing. A Honeynet is a type of honeypot. Specifically, it is a high-interaction honeypot designed to capture extensive information on threats. The primary purpose of a Honeynet is to gather information about threats that exist. Virtual Honeynets represent a relatively new field for Honeynets. The concept is to virtually run an entire Honeynet on a single physical computer. The purpose is to make Honeynets a cheaper solution that is easier to mange and maintain. Instead of investing in large amounts of hardware, all of the hardware requirements are combined onto a single system. The research found that the Internet is not secure and is full of network abuses and attacks. Most of the attacks found were by an automated worm and script kiddies. 2004 Thesis https://ir.uitm.edu.my/id/eprint/63204/ https://ir.uitm.edu.my/id/eprint/63204/1/63204.pdf text en public degree Universiti Teknologi MARA (UiTM) Faculty of Computer and Mathematical Sciences Othman, Abdul Hamid |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
advisor |
Othman, Abdul Hamid |
topic |
Computer networks General works Traffic monitoring |
spellingShingle |
Computer networks General works Traffic monitoring Roslan, Fairuzan Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
description |
Traditionally, information security has been purely defensive. Firewalls, Intrusion Detection Systems, encryption; all of these mechanisms are used defensively to protect one's resources. One of the greatest problems the security community faces is lack of information on the attacker. This is one of the main reasons why the computer crime and network attacks are still increasing. A Honeynet is a type of honeypot. Specifically, it is a high-interaction honeypot designed to capture extensive information on threats. The primary purpose of a Honeynet is to gather information about threats that exist. Virtual Honeynets represent a relatively new field for Honeynets. The concept is to virtually run an entire Honeynet on a single physical computer. The purpose is to make Honeynets a cheaper solution that is easier to mange and maintain. Instead of investing in large amounts of hardware, all of the hardware requirements are combined onto a single system. The research found that the Internet is not secure and is full of network abuses and attacks. Most of the attacks found were by an automated worm and script kiddies. |
format |
Thesis |
qualification_level |
Bachelor degree |
author |
Roslan, Fairuzan |
author_facet |
Roslan, Fairuzan |
author_sort |
Roslan, Fairuzan |
title |
Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
title_short |
Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
title_full |
Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
title_fullStr |
Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
title_full_unstemmed |
Detecting network attacks using virtual honeynet technology / Fairuzan Roslan |
title_sort |
detecting network attacks using virtual honeynet technology / fairuzan roslan |
granting_institution |
Universiti Teknologi MARA (UiTM) |
granting_department |
Faculty of Computer and Mathematical Sciences |
publishDate |
2004 |
url |
https://ir.uitm.edu.my/id/eprint/63204/1/63204.pdf |
_version_ |
1783735293629693952 |