Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/22738
Title: | Collection and Analysis of Attackers Data using Honeynet |
Other Titles: | جمع وتحليل بيانات المهاجمين باستخدام الهوني نت |
Authors: | Shaikhedris, Solafa Salahaldin Ali Supervisor, - Faisal Mohammed Abdalla Ali |
Keywords: | Information Technology Data using Honeynet Collection and Analysis Attackers Data |
Issue Date: | 10-Feb-2018 |
Publisher: | Sudan University of Science and Technology |
Citation: | Shaikhedris, Solafa Salahaldin Ali . Collection and Analysis of Attackers Data using Honeynet / Solafa Salahaldin Ali Shaikhedris ; Faisal Mohammed Abdalla Ali .- Khartoum: Sudan University of Science and Technology, college of Computer science and information technology, 2019 .- 61p. :ill. ;28cm .- M.Sc. |
Abstract: | Honey pots and honey nets are secure unconventional tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honey pots and honey nets. Honey pots are devices deployed specifically to be a resource for the attack or compromising. Honeynets are deployed to collect information, namely the tools and tactics and motivations of the hacker’s community, and then this information is used to protect the organizations from different threats. This research aims to study the most frequent, new and automated attacks, moreover the behavior of the malicious attackers is analyzed as soon as they got manage to access a new host. Virtual honey net is implemented in order to capture the whole activities of the attackers. The collected data is analyzing using Wireshark in order to get massive information about hackers. In addition to this, the research explains a secure method to transfer collected data from honey pots to be Analyzed. Results were analyzed attacks targeting our honeynet over a period of 60 days, which made it obviously for us to know: Attacked/Probed ports and services, Attacker IP's, OS used in every packet that were captured, Packet length, format, and time. |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/22738 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Collection and Analysis....pdf | Research | 2.02 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.