Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network

Examensarbete för masterexamen

Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.12380/129915
Download file(s):
File Description SizeFormat 
129915.pdfFulltext2.28 MBAdobe PDFView/Open
Type: Examensarbete för masterexamen
Master Thesis
Title: Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network
Authors: Aliyev, Vusal
Abstract: Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major threat to the security of networks and creates significant security risks to the organizations. In order to protect the networked systems against these kinds of threats and try to find methods to stop at least some part of them, we must learn more about their behavior, and also methods and tactics of the attackers, which attack our networks. This thesis makes a practical analysis of observed attacks and exploited vulnerabilities using honeypots in an organization network. Based on this,we study the attackers' behavior and in particular the skill level of the attackers once they gain access to the honeypot systems. The first part of the work describes: i) the honeypot architecture as well as implementation details so that we can observe the attackers behavior and ii) proposed hybrid honeypot solution which will be used in the future work. The second part presents: i) the detailed analysis and classification of the attacks and vulnerabilities, which are used by the attackers and ii) the attackers' skill level based on the exploited vulnerabilities.
Keywords: Information Technology;Informationsteknik
Issue Date: 2010
Publisher: Chalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)
Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers)
URI: https://hdl.handle.net/20.500.12380/129915
Collection:Examensarbeten för masterexamen // Master Theses



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.