DSpace Repository

NETWORK SECURITY USING HONEYPOT

Show simple item record

dc.contributor.author KOLAWOLE, AYANFEOLUWA
dc.date.accessioned 2022-06-20T10:54:07Z
dc.date.available 2022-06-20T10:54:07Z
dc.date.issued 2019
dc.identifier.citation KOLAWOLE AYANFE (2019) NETWORK SECURITY USING HONEYPOT en_US
dc.identifier.other 15010301013
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/139
dc.description.abstract Day by day, more and more people are using internet all over the world. It is becoming a part of everyone’s life. People are checking their e-mails, surfing over internet, purchasing goods, playing online games, paying bills on the internet etc. However, while performing all these things, how many people know about security? Do they know the risk of being attacked, infecting by malicious software? Even some of the malicious software are spreading over network to create more threats by users. How many users are aware of that their computer may be used as zombie computers to target other victim systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these problems. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well-designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviors in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks. en_US
dc.language.iso en en_US
dc.publisher Mountain Top University en_US
dc.subject Honeypot en_US
dc.subject hacking en_US
dc.subject security en_US
dc.subject forensic analysis of honeypots en_US
dc.subject network en_US
dc.title NETWORK SECURITY USING HONEYPOT en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account