DSpace Repository

Honeypots in Cybersecurity– A Security Mechanism That Creats a Virtual Trap To Lure Attackers

Show simple item record

dc.contributor.author Naznin, Marina
dc.date.accessioned 2023-03-05T03:20:44Z
dc.date.available 2023-03-05T03:20:44Z
dc.date.issued 23-01-18
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/9819
dc.description.abstract As the popularity of wireless networks soars, maintaining their security is a significant challenge. Wi-Fi networks are susceptible to Rogue Access Points because of the open medium, inadequate software implementation, potential for hardware deficiencies, and inappropriate configuration (RAP). Unauthorized access points known as "rogue access points" can be installed by end users without the security administrator's knowledge. When this malicious device is linked to the Internet, an attacker can utilize it to compromise the network's security. I ran various port and service script configurations, simulated operating systems, and tested which formats worked best as a research honey pot and which formats worked best as a decoy to safeguard other network users. In order to get better results for both goals in the coming weeks, we examined the results. However, configurations successful for one objective were not always successful for the other.Nevertheless, I did uncover promising setups for both purposes. Additionally, I determined the most typical attacks, the most typical ports utilized by attackers, and the level of effectiveness of decoy service scripts. I'll examine the system's architecture, configuration, and operation. After the system's operational phases are complete, I'll look at how the results are pulled from the database and how they're analyzed. In order to create new rules that might prevent them in the future, I must mine through the retrieved results to try to locate the harmful data. I will have a solid understanding of the network traffic that has been recorded and what makes up some of the more intriguing packets at the project's conclusion. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject Wireless networks en_US
dc.subject Wi-Fi networks en_US
dc.subject Software en_US
dc.title Honeypots in Cybersecurity– A Security Mechanism That Creats a Virtual Trap To Lure Attackers en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics