dc.contributor.author |
Shaikhedris, Solafa Salahaldin Ali |
|
dc.contributor.author |
Supervisor, - Faisal Mohammed Abdalla Ali |
|
dc.date.accessioned |
2019-06-25T06:47:59Z |
|
dc.date.available |
2019-06-25T06:47:59Z |
|
dc.date.issued |
2018-02-10 |
|
dc.identifier.citation |
Shaikhedris, Solafa Salahaldin Ali . Collection and Analysis of Attackers Data using Honeynet / Solafa Salahaldin Ali Shaikhedris ; Faisal Mohammed Abdalla Ali .- Khartoum: Sudan University of Science and Technology, college of Computer science and information technology, 2019 .- 61p. :ill. ;28cm .- M.Sc. |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/22738 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
Honey pots and honey nets are secure unconventional tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honey pots and honey nets. Honey pots are devices deployed specifically to be a resource for the attack or compromising. Honeynets are deployed to collect information, namely the tools and tactics and motivations of the hacker’s community, and then this information is used to protect the organizations from different threats. This research aims to study the most frequent, new and automated attacks, moreover the behavior of the malicious attackers is analyzed as soon as they got manage to access a new host. Virtual honey net is implemented in order to capture the whole activities of the attackers. The collected data is analyzing using Wireshark in order to get massive information about hackers. In addition to this, the research explains a secure method to transfer collected data from honey pots to be Analyzed. Results were analyzed attacks targeting our honeynet over a period of 60 days, which made it obviously for us to know: Attacked/Probed ports and services, Attacker IP's, OS used in every packet that were captured, Packet length, format, and time. |
en_US |
dc.description.sponsorship |
Sudan University of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science and Technology |
en_US |
dc.subject |
Information Technology |
en_US |
dc.subject |
Data using Honeynet |
en_US |
dc.subject |
Collection and Analysis |
en_US |
dc.subject |
Attackers Data |
en_US |
dc.title |
Collection and Analysis of Attackers Data using Honeynet |
en_US |
dc.title.alternative |
جمع وتحليل بيانات المهاجمين باستخدام الهوني نت |
en_US |
dc.type |
Thesis |
en_US |