Implementing honeypot LAN detection
Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap.The attacker then tried to attempt the server or important network parts through ports on the network.Regarding that situation, it will be cause some of the host on the n...
Saved in:
Main Author: | |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2005
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/3692/1/AMRAN_BIN_SALLEH.PDF http://umpir.ump.edu.my/id/eprint/3692/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.3692 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.36922015-03-03T08:02:38Z http://umpir.ump.edu.my/id/eprint/3692/ Implementing honeypot LAN detection Amran, Salleh QA Mathematics Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap.The attacker then tried to attempt the server or important network parts through ports on the network.Regarding that situation, it will be cause some of the host on the network unusable.To overcome this problem, one system has been developed for network administrator and it be used in the area of computer and Internet security. It is a resource,which is it intended to be attacked and compromised to gain more information about the attacker and his attack techniques. By using this technique the administrator can gather more information about the attacker. The administrator will get the pop up message based on each suspicious traffic on the network. Honeypot used to save information from attacker such as JP address, Mac Address,time attack, local port and remote port that honeypot deal with. When honeypot was attacked,the administrator uses the information to learn about vulnerabilities of the current network and improve it for the future. The expected from this honeypot, it will help the administrator to detect and know what port that is use by the attacker in the network. Microsoft Visual Basic 6.0 and Microsoft Access 2003 will be used to develop interface and database of honeypot.The investigation on this system can be used in future and can be extensive. 2005-10 Undergraduates Project Papers NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/3692/1/AMRAN_BIN_SALLEH.PDF Amran, Salleh (2005) Implementing honeypot LAN detection. Faculty of Computer System & Software Engineering, Universiti Malaysia Pahang. |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA Mathematics |
spellingShingle |
QA Mathematics Amran, Salleh Implementing honeypot LAN detection |
description |
Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap.The attacker then tried to attempt the server or important network parts through ports on the network.Regarding that situation, it will be cause some of the host on the network unusable.To overcome this problem, one system has been developed for network administrator
and it be used in the area of computer and Internet security. It is a resource,which is it intended to be attacked and compromised to gain more information about the
attacker and his attack techniques. By using this technique the administrator can gather more information about the attacker. The administrator will get the pop up message based on each suspicious traffic on the network. Honeypot used to save information from attacker such as JP address, Mac Address,time attack, local port and remote port that honeypot deal with. When honeypot was attacked,the administrator uses the information to learn about vulnerabilities of the current network and improve it for the future. The expected from this honeypot, it will help
the administrator to detect and know what port that is use by the attacker in the network. Microsoft Visual Basic 6.0 and Microsoft Access 2003 will be used to develop interface and database of honeypot.The investigation on this system can be used in future and can be extensive.
|
format |
Undergraduates Project Papers |
author |
Amran, Salleh |
author_facet |
Amran, Salleh |
author_sort |
Amran, Salleh |
title |
Implementing honeypot LAN detection |
title_short |
Implementing honeypot LAN detection |
title_full |
Implementing honeypot LAN detection |
title_fullStr |
Implementing honeypot LAN detection |
title_full_unstemmed |
Implementing honeypot LAN detection |
title_sort |
implementing honeypot lan detection |
publishDate |
2005 |
url |
http://umpir.ump.edu.my/id/eprint/3692/1/AMRAN_BIN_SALLEH.PDF http://umpir.ump.edu.my/id/eprint/3692/ |
_version_ |
1643664858276691968 |
score |
13.211869 |