Tell your friends about this item:
Designing and Evaluating the Honeypots Using Virtual Machine: to Enhance the Accountability of a System and Modernize to Be More Shielded
Danish Jamil
Designing and Evaluating the Honeypots Using Virtual Machine: to Enhance the Accountability of a System and Modernize to Be More Shielded
Danish Jamil
In this dissertation I had explored so many different methods of building HoneyNet. Outside these methods, I look in-depth details on the UML and VMware. This dissertation illustrates tell the steps which are compulsory in inventing a HoneyPot machine. Moreover it also tells that what are the thing an administrator must watch out whilst building a HoneyPot, for example; UML fingerprinting, and VMware and security issues. I had also, demonstrated the monitoring techniques and methods to test develop. I was also clarifying the various techniques of fingerprinting that an intruder might be use for to conclude that if it is a virtual system. In addition, it also demonstrates the various ways to countermeasure fingerprinting. Therefore, making the intruder in thinking that he/she attacking on the real system. Security issues are also talk about in this dissertation. To stop the intruder from exploiting the HoneyPot system and using the system to attack on the different networks, I utilized a firewall. Also, by installing a firewall to defend the other networks. On the other hand, it is also feasible for a firewall to defend the host OS from the attacker?s within the HoneyPot system.
Media | Books Paperback Book (Book with soft cover and glued back) |
Released | May 7, 2012 |
ISBN13 | 9783659000232 |
Publishers | LAP LAMBERT Academic Publishing |
Pages | 164 |
Dimensions | 150 × 10 × 226 mm · 249 g |
Language | English |
See all of Danish Jamil ( e.g. Paperback Book )