Web threats detection using client honeypot / Mohd Khairi Mohd Nor

Internet and network computer has become a common work environment for user and companies. The internet connects millions of computers provide a global communication. This global connectivity among open system is very important because of the availability of the services and resources for the users....

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mohd Nor, Mohd Khairi
التنسيق: أطروحة
اللغة:English
منشور في: 2012
الموضوعات:
الوصول للمادة أونلاين:https://ir.uitm.edu.my/id/eprint/63225/1/63225.pdf
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:Internet and network computer has become a common work environment for user and companies. The internet connects millions of computers provide a global communication. This global connectivity among open system is very important because of the availability of the services and resources for the users. Most of the computing devices store and transmit information between the users such as web pages, email, video conference, online banking and e-government. Any computers that become part of the network environment have faced some major problems or risk that can give some impact for the computer system. Protection of any risk launched over networks is probably the most aspect of computer security. Thus, security must be a vital policy for users and organization since most commonly attack launched because of the vulnerability opportunity exploitation of the system. The objective of this project is to analyze any kind of attack that has occurred in the client system using the deployment of the client honeypot and generate a report based on the attacks that have been detected. This project uses the client honeypot which are Capture HPC, Shelia, Web Exploit Finder, SpyBye and PhoneyC. As a result of this project, the client honeypot successfully analyze and determine whether the web server is malicious or clean. It is hope this project will give benefits to all students and especially for the network administrator in order to monitor and prevent from malware exploitation.