Show simple item record

dc.contributor.authorMuhumuza, Allan
dc.date.accessioned2022-11-21T10:23:55Z
dc.date.available2022-11-21T10:23:55Z
dc.date.issued2018-12-07
dc.identifier.citationMuhumuza, Al. (2018). Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis. Master Thesis. Makerere Universityen_US
dc.identifier.urihttp://hdl.handle.net/10570/10994
dc.descriptionA project report submitted to the College of Computing and Informatics Technology for the study leading to a partial fulfillment of the requirements for the award of the Degree of Master of Science in Computer Science of Makerere Universityen_US
dc.description.abstractAs the technological change leads to the use of information systems to store and process data, the need to protect the systems becomes very important as it can cause to data leakage, disruption in processing among other things which then lead to financial losses and endangering of the persons whose information has been leaked. Honey Pots are one of the ways these information systems can be protected from authorized access through understanding the motives of the attacker and the methods being used to try access the systems. With this information collected, the production system can be hardened and information protected. This project helped develop a Honeypot detection system that helps the honeypot developers check the built honeypots and harden them to prevent them from being detected by the attackers. The honeypot detection tool was tested on windows honeypots that are currently in use, a production server was used a control environment and the results showed that honeypots in production can be detected by the hackers. Honeypots that are not easily detectable are important as they help organizations to collect lots of data on the methods the attackers are likely to use, and the information being targeted by the hackers. The loop holes in these areas can then be patched to keep the information systems safe. The project also proposes a high level model on how honeypots for windows systems can be made undetectable and lead to the collection of more information about the attack, this model can also be replicated in the systems that are being operated by the rganizations.en_US
dc.language.isoenen_US
dc.publisherMakerere Universityen_US
dc.subjectHoneyPots, Securityen_US
dc.subjectInformation technology securityen_US
dc.titleDeveloping a low interaction honeypot detection system in a networked environment using live environment and network analysis.en_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record