National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
Virtual honeynet with simulated user activity
Kouba, Tomáš ; Kaňkovský, Pavel (advisor) ; Knap, Tomáš (referee)
The goal of the work is to design and implement a honeypot (a trap for attackers) that will be able to simulate working user and other usual system activity in a convincing way so as to make it difficult to distinguish a honeypot from an ordinary system, will keep a stealth record of actions of any attackers who would attack the honeypot, and will make it possible to deploy a whole virtual network of honeypots (a honeynet) on a single host machine. The implementation should be resistant to any of the well-known techniques used to detect a modified operating system or OS kernel such as the kstat utility.
Virtual honeynet with simulated user activity
Kouba, Tomáš ; Knap, Tomáš (referee) ; Kaňkovský, Pavel (advisor)
The goal of the work is to design and implement a honeypot (a trap for attackers) that will be able to simulate working user and other usual system activity in a convincing way so as to make it difficult to distinguish a honeypot from an ordinary system, will keep a stealth record of actions of any attackers who would attack the honeypot, and will make it possible to deploy a whole virtual network of honeypots (a honeynet) on a single host machine. The implementation should be resistant to any of the well-known techniques used to detect a modified operating system or OS kernel such as the kstat utility.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.