Avancerad sökning
Visar resultat 1 - 5 av 20 uppsatser som matchar ovanstående sökkriterier.
1. An evaluation of Honeypots with Compliant Kubernetes
Master-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : This thesis evaluates different honeypot technologies and how they can be integrated into Compliant Kubernetes (CK8s), a secure open-source distribution of Kubernetes designed to address various compliance and regulatory requirements. The thesis identifies and compares the features, metrics, and suitability of several candidate honeypots for CK8s based on a literature survey and experimental testing. LÄS MER
2. Strategies of Honeypot Placement in Cyberspace
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. LÄS MER
3. A case study of unauthorized login attempts against honeypots via remote desktop
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER
4. Honeypot study of threats targeting critical infrastructure
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. LÄS MER
5. Developing a modular, high-interaction honeypot using container virtualization
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. LÄS MER