Die vorliegende Arbeit beschreibt die Entwicklung eines high interaction Honeypots mit aktuellen Technologien. Für die Umsetzung werden Container als Angriffsumgebung, Gitlab für die Automatisierung und den Cloud Provider AWS als Hoster verwendet. Ziel dieser Ausarbeitung ist, die Aufzeichnungen von Angriffen durch einen modernen Honeypot darzustellen, ohne die Kontrolle über die Sicherheit zu verlieren.This paper describes the development of a high interaction honeypot with current technologies. For the implementation containers are used as attack environment, Gitlab for automation and the cloud provider AWS as host. The aim of this paper is to present the records of attacks through a modern honeypot without losing control over security
Die Analyse von Angriffen auf IT-Systeme ist ein wichtiges Thema der ITSicherheitsforschung. Vor all...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
In einer Welt in der immer mehr Alltagsgegenstände mit dem Internet verbunden sind, wächst die Anzah...
Hiermit erkläre ich, dass ich die vorliegende Abschlußarbeit selbständig und nur mit den angegebenen...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
The security of their network remains the priorities of almost all companies. Existing security syst...
The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of s...
In current global internet cyber space, the number of targeted client side attacks are increasing th...
In recent years, the cyber warfare has gone far longer and wider than it used to be. Cyber terrorism...
This text deals with computer network security using honeypot technology, as a tool of intentional t...
Nowadays, we are facing with network threats that cause enormous damage to the Internet community da...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Die Analyse von Angriffen auf IT-Systeme ist ein wichtiges Thema der ITSicherheitsforschung. Vor all...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
In einer Welt in der immer mehr Alltagsgegenstände mit dem Internet verbunden sind, wächst die Anzah...
Hiermit erkläre ich, dass ich die vorliegende Abschlußarbeit selbständig und nur mit den angegebenen...
This paper presents the design of a secured high-interaction honeypot. The challenge is to have a ho...
The security of their network remains the priorities of almost all companies. Existing security syst...
The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of s...
In current global internet cyber space, the number of targeted client side attacks are increasing th...
In recent years, the cyber warfare has gone far longer and wider than it used to be. Cyber terrorism...
This text deals with computer network security using honeypot technology, as a tool of intentional t...
Nowadays, we are facing with network threats that cause enormous damage to the Internet community da...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Die Analyse von Angriffen auf IT-Systeme ist ein wichtiges Thema der ITSicherheitsforschung. Vor all...
Abstract — This paper presents a summary of university research performed on honeypot techniques and...
Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major...