Welcome To UTPedia

We would like to introduce you, the new knowledge repository product called UTPedia. The UTP Electronic and Digital Intellectual Asset. It stores digitized version of thesis, dissertation, final year project reports and past year examination questions.

Browse content of UTPedia using Year, Subject, Department and Author and Search for required document using Searching facilities included in UTPedia. UTPedia with full text are accessible for all registered users, whereas only the physical information and metadata can be retrieved by public users. UTPedia collaborating and connecting peoples with university’s intellectual works from anywhere.

Disclaimer - Universiti Teknologi PETRONAS shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.Best viewed using Mozilla Firefox 3 or IE 7 with resolution 1024 x 768.

Honeypot setup for education

Shahabudin, Muhd Harith Fathillah (2005) Honeypot setup for education. Universiti Teknologi Petronas. (Unpublished)

[img] PDF
Download (1223Kb)

Abstract

"Honeypot" is just a computer system or a network segment, loaded with servers and devices and data. It may be protected with a firewall, although you want the attackers to have some access. There may be some monitoring capability, done carefully so that the monitoring is not evident to the attacker. The reason to setup honeypot varies from avoid tampering to tracking and capturingthe attacker. The purpose for this project is to set up an education tool for student to learn and know how honeypot works. Because of the increasing rate of cyber crime, it is hope that with this, it can encourage the student and the public generally to be more aware about the matter concerning information technology security. The Honeynet Project made up of a small group of security professionals dedicated to learning the tools and tactics of the black-hat community and sharing those lessons learned with the security community. Their contribution varies from how to setup a honeypot to how the attacker behaves and what triggers them is shown in this paper and research. To design this particular honeypot, I've use the waterfallmodel methodology as a guideline to build and design it. Honeypot are interesting research topic and open up a new field of technology and creative thinking.

Item Type: Final Year Project
Academic Subject : Academic Department - Information Communication Technology
Subject: Z Bibliography. Library Science. Information Resources > ZA Information resources
Divisions: Sciences and Information Technology
Depositing User: Users 2053 not found.
Date Deposited: 30 Sep 2013 16:55
Last Modified: 25 Jan 2017 09:46
URI: http://utpedia.utp.edu.my/id/eprint/7656

Actions (login required)

View Item View Item

Document Downloads

More statistics for this item...