Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/22738
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShaikhedris, Solafa Salahaldin Ali
dc.contributor.authorSupervisor, - Faisal Mohammed Abdalla Ali
dc.date.accessioned2019-06-25T06:47:59Z
dc.date.available2019-06-25T06:47:59Z
dc.date.issued2018-02-10
dc.identifier.citationShaikhedris, Solafa Salahaldin Ali . Collection and Analysis of Attackers Data using Honeynet / Solafa Salahaldin Ali Shaikhedris ; Faisal Mohammed Abdalla Ali .- Khartoum: Sudan University of Science and Technology, college of Computer science and information technology, 2019 .- 61p. :ill. ;28cm .- M.Sc.en_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/22738
dc.descriptionThesisen_US
dc.description.abstractHoney pots and honey nets are secure unconventional tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honey pots and honey nets. Honey pots are devices deployed specifically to be a resource for the attack or compromising. Honeynets are deployed to collect information, namely the tools and tactics and motivations of the hacker’s community, and then this information is used to protect the organizations from different threats. This research aims to study the most frequent, new and automated attacks, moreover the behavior of the malicious attackers is analyzed as soon as they got manage to access a new host. Virtual honey net is implemented in order to capture the whole activities of the attackers. The collected data is analyzing using Wireshark in order to get massive information about hackers. In addition to this, the research explains a secure method to transfer collected data from honey pots to be Analyzed. Results were analyzed attacks targeting our honeynet over a period of 60 days, which made it obviously for us to know: Attacked/Probed ports and services, Attacker IP's, OS used in every packet that were captured, Packet length, format, and time.en_US
dc.description.sponsorshipSudan University of Science and Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science and Technologyen_US
dc.subjectInformation Technologyen_US
dc.subjectData using Honeyneten_US
dc.subjectCollection and Analysisen_US
dc.subjectAttackers Dataen_US
dc.titleCollection and Analysis of Attackers Data using Honeyneten_US
dc.title.alternativeجمع وتحليل بيانات المهاجمين باستخدام الهوني نتen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Collection and Analysis....pdfResearch2.02 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.