The result of the thesis is to characterize the safety technology
honeypots, presentation of their capability to monitor security attacks, finding
motivation of the attackers and their techniques.
The theoretical part of solving the problems of the thesis is based on the study and analysis of mostly foreign expert information resources. The practical part is based on the specification and implementation of the most famous Honeypot on the Internet and the subsequent analysis of logs.
The benefit of the thesis are the results that have been offered and the network
security specialists for analysis and automatic recording of threats to records
third-party servers.
Identifer | oai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:259876 |
Date | January 2016 |
Creators | Buriánek, Adam |
Contributors | Halbich, Čestmír, Radomír, Radomír |
Publisher | Česká zemědělská univerzita v Praze |
Source Sets | Czech ETDs |
Language | Czech |
Detected Language | English |
Type | info:eu-repo/semantics/masterThesis |
Rights | info:eu-repo/semantics/restrictedAccess |
Page generated in 0.0022 seconds