000 01705nam a22001817a 4500
003 OSt
005 20220107122809.0
008 160317b xxu||||| |||| 00| 0 eng d
040 _c
100 _aAnju G S(93613004)
_98544
245 _aStudy and implementation of attacker detection system by extending honeyd
502 _bMaster of Science in Computer Science and Information security
_c2013-2015
_dEXT
_eK Pradeep Kumar
_fVivek
_g"Mirox Cyber Security & Technology"
520 _aHoneypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypot that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addresses. To fool network fingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary services for an arbitrary number of virtual systems. Furthermore, the system supports virtual routing topologies that allow the creation of large virtual networks including characteristics like latency and packet loss. We discuss Honeyd’s design and implementation.
650 _aINFORMATION SECURITY
_98545
650 _aCOMPUTER SECURITY
_98546
650 _aHONEYPOT
_98547
942 _2ddc
_cPR
999 _c4999
_d4999