Web threats detection using client honeypot / Mohd Khairi Mohd Nor

Internet and network computer has become a common work environment for user and companies. The internet connects millions of computers provide a global communication. This global connectivity among open system is very important because of the availability of the services and resources for the users....

Full description

Saved in:
Bibliographic Details
Main Author: Mohd Nor, Mohd Khairi
Format: Thesis
Language:English
Published: 2012
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/63225/1/63225.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Internet and network computer has become a common work environment for user and companies. The internet connects millions of computers provide a global communication. This global connectivity among open system is very important because of the availability of the services and resources for the users. Most of the computing devices store and transmit information between the users such as web pages, email, video conference, online banking and e-government. Any computers that become part of the network environment have faced some major problems or risk that can give some impact for the computer system. Protection of any risk launched over networks is probably the most aspect of computer security. Thus, security must be a vital policy for users and organization since most commonly attack launched because of the vulnerability opportunity exploitation of the system. The objective of this project is to analyze any kind of attack that has occurred in the client system using the deployment of the client honeypot and generate a report based on the attacks that have been detected. This project uses the client honeypot which are Capture HPC, Shelia, Web Exploit Finder, SpyBye and PhoneyC. As a result of this project, the client honeypot successfully analyze and determine whether the web server is malicious or clean. It is hope this project will give benefits to all students and especially for the network administrator in order to monitor and prevent from malware exploitation.