Honeypots in windows environment / Nurul Aini Zainal Abidin

The Internet is growing fast and the number of people using the Internet is doubling every year. At the same time, computer crimes are increasing. Honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and compromised to gain more informati...

全面介紹

Saved in:
書目詳細資料
主要作者: Zainal Abidin, Nurul Aini
格式: Thesis
語言:English
出版: 2004
主題:
在線閱讀:https://ir.uitm.edu.my/id/eprint/98091/1/98091.pdf
https://ir.uitm.edu.my/id/eprint/98091/
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Universiti Teknologi Mara
語言: English
id my.uitm.ir.98091
record_format eprints
spelling my.uitm.ir.980912024-07-28T16:07:11Z https://ir.uitm.edu.my/id/eprint/98091/ Honeypots in windows environment / Nurul Aini Zainal Abidin Zainal Abidin, Nurul Aini Analysis The Internet is growing fast and the number of people using the Internet is doubling every year. At the same time, computer crimes are increasing. Honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and his attacks technique. The main goal of this project is to understand and increase the appreciation of Honeypots. There are misconceptions about the Honeypots. People feel that Honeypots required too much work, building advanced jail environments, recording binaries or developing sophisticated kernel module. Some of them fear that if Honeypot is misconfigured or not maintained properly, attackers will have access to resources. Compared to an Intrusion Detection System (IDS), Honeypots have the biggest advantage that they do not generate false alerts as each traffics is suspicious, because no productive components are running on the system. This fact enables the system to log every byte and to correlate the data with other sources, and draw a picture of an attack and the attacker. 2004 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/98091/1/98091.pdf Honeypots in windows environment / Nurul Aini Zainal Abidin. (2004) Degree thesis, thesis, Universiti Teknologi MARA (UiTM).
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Analysis
spellingShingle Analysis
Zainal Abidin, Nurul Aini
Honeypots in windows environment / Nurul Aini Zainal Abidin
description The Internet is growing fast and the number of people using the Internet is doubling every year. At the same time, computer crimes are increasing. Honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and his attacks technique. The main goal of this project is to understand and increase the appreciation of Honeypots. There are misconceptions about the Honeypots. People feel that Honeypots required too much work, building advanced jail environments, recording binaries or developing sophisticated kernel module. Some of them fear that if Honeypot is misconfigured or not maintained properly, attackers will have access to resources. Compared to an Intrusion Detection System (IDS), Honeypots have the biggest advantage that they do not generate false alerts as each traffics is suspicious, because no productive components are running on the system. This fact enables the system to log every byte and to correlate the data with other sources, and draw a picture of an attack and the attacker.
format Thesis
author Zainal Abidin, Nurul Aini
author_facet Zainal Abidin, Nurul Aini
author_sort Zainal Abidin, Nurul Aini
title Honeypots in windows environment / Nurul Aini Zainal Abidin
title_short Honeypots in windows environment / Nurul Aini Zainal Abidin
title_full Honeypots in windows environment / Nurul Aini Zainal Abidin
title_fullStr Honeypots in windows environment / Nurul Aini Zainal Abidin
title_full_unstemmed Honeypots in windows environment / Nurul Aini Zainal Abidin
title_sort honeypots in windows environment / nurul aini zainal abidin
publishDate 2004
url https://ir.uitm.edu.my/id/eprint/98091/1/98091.pdf
https://ir.uitm.edu.my/id/eprint/98091/
_version_ 1806422109596942336