Testing deceptive honeypots
dc.contributor.advisor | Rowe, Neil C. | |
dc.contributor.author | Yahyaoui, Aymen | |
dc.date | Sep-14 | |
dc.date.accessioned | 2014-12-05T20:11:03Z | |
dc.date.available | 2014-12-05T20:11:03Z | |
dc.date.issued | 2014-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/44032 | |
dc.description.abstract | Deception can be a useful defensive technique against cyber attacks. It has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. The objective of this thesis was to test the effectiveness of some honeypot tools in real networks by varying their location and virtualization, and by adding more deception to them. We tested both a web honeypot tool and an SSH honeypot tool. We deployed the web honeypot in both a residential network and at the Naval Postgraduate School network; the NPS honeypot attracted more attackers. Results also showed that the virtual honeypots received attacks from more unique IP addresses, and that adding deception to the web honeypot generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate website www.cmand.org. The traffic distributions for the web honeypot and the legitimate website showed similarities, but the SSH honeypot was different. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods. | en_US |
dc.description.uri | http://archive.org/details/testingdeceptive1094544032 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Testing deceptive honeypots | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Fulp, J. D. | |
dc.contributor.department | Computer Science | |
dc.subject.author | Honeypots | en_US |
dc.subject.author | Intrusion Detection System | en_US |
dc.subject.author | Deception. | en_US |
dc.description.service | Captain, Tunisian Air Force | en_US |
etd.thesisdegree.name | Master of Science in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.