This text deals with computer network security using honeypot technology, as a tool of intentional trap for attackers. It closely describes basic thoughts, together with advantages and disadvantages of this concept. The main aim is a low interaction honeypot Honeyd, its functionality and possible extensional features. As a practical part of the text there is a description of principles of implementation Honeyd service scripts, which are represented as a simulation of behavior of computer worm Conficker. Further it describes creation of automated script used for analysis and processing of gathered data, captured during actual deployment of Honeyd in Internet network
This work describes honeypots, their definition, clasification and logging possibilities. In the pra...
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the ...
Various attacks today are used by attackers to compromise the network security these days. These exp...
Every computer connected to a wide computer network is vulnerable to the occurrence of data, i...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
We always hear news about hacker's being arrested or a group of internet saboteurs discovered. Hacki...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
A honeypot is a trap set to detect attempts at unauthorized use of information systems. Generally it...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
In the real-world network system, an enormous number of applications and services available for data...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
The security of their network remains the priorities of almost all companies. Existing security syst...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
This thesis deals with the area of honeypots and honeynets. It defines their classification and cont...
This work describes honeypots, their definition, clasification and logging possibilities. In the pra...
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the ...
Various attacks today are used by attackers to compromise the network security these days. These exp...
Every computer connected to a wide computer network is vulnerable to the occurrence of data, i...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
We always hear news about hacker's being arrested or a group of internet saboteurs discovered. Hacki...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
A honeypot is a trap set to detect attempts at unauthorized use of information systems. Generally it...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
In the real-world network system, an enormous number of applications and services available for data...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
The security of their network remains the priorities of almost all companies. Existing security syst...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
This thesis deals with the area of honeypots and honeynets. It defines their classification and cont...
This work describes honeypots, their definition, clasification and logging possibilities. In the pra...
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the ...
Various attacks today are used by attackers to compromise the network security these days. These exp...