This project studies the three honeypot solutions Honeyd,Dionaea, and Kippo. Eval-uating the solutions themselves, and observing their implementation into the university campus network. The investigation begins with the understanding of how a honeypot works and is useful as an extra security layer, following with an implementation of said three honeypot solutions and the results that follow after a period of days. After the data has been collected, it shows that the majority of malicious activity surrounded communication services, and an evaluation of the three honeypot solutions showed Honeyd as the best with its scalability and reconfigurability.
Identifer | oai:union.ndltd.org:UPSALLA1/oai:DiVA.org:lnu-66885 |
Date | January 2017 |
Creators | Ponten, Austin |
Publisher | Linnéuniversitetet, Institutionen för datavetenskap (DV) |
Source Sets | DiVA Archive at Upsalla University |
Language | English |
Detected Language | English |
Type | Student thesis, info:eu-repo/semantics/bachelorThesis, text |
Format | application/pdf |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0014 seconds