• Login
    View Item 
    •   Home
    • University of Alaska Fairbanks
    • UAF Graduate School
    • Computer Science
    • View Item
    •   Home
    • University of Alaska Fairbanks
    • UAF Graduate School
    • Computer Science
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Scholarworks@UACommunitiesPublication DateAuthorsTitlesSubjectsTypeThis CollectionPublication DateAuthorsTitlesSubjectsType

    My Account

    Login

    First Time Submitters, Register Here

    Register

    Statistics

    Display statistics

    A Methodology For Intelligent Honeypot Deployment And Active Engagement Of Attackers

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    Hecker_C_2012.pdf
    Size:
    4.063Mb
    Format:
    PDF
    Download
    Author
    Hecker, Christopher R.
    Chair
    Nance, Kara
    Hay, Brian
    Keyword
    Computer science
    Metadata
    Show full item record
    URI
    http://hdl.handle.net/11122/9143
    Abstract
    The internet has brought about tremendous changes in the way we see the world, allowing us to communicate at the speed of light, and dramatically changing the face of business forever. Organizations are able to share their business strategies and sensitive or proprietary information across the globe in order to create a sense of cohesiveness. This ability to share information across the vastness of the internet also allows attackers to exploit these different avenues to steal intellectual property or gather information vital to the national security of an entire nation. As technology advances to include more devices accessing an organization's network and as more business is handled via the internet, attackers' opportunities increase daily. Honeypots were created in response to this cyber warfare. Honeypots provide a technique to gather information about attackers performing reconnaissance on a network or device without the voluminous logs obtained by the majority of intrusion detection systems. This research effort provides a methodology to dynamically generate context-appropriate honeynets. Administrators are able to modify the system to conform to the target environment and gather the information passively or through increasing degrees of active scanning. The information obtained during the process of scanning the environment aids the administrator in creating a network topology and understanding the flux of devices in the network. This research continues the effort to defend an organization's networks against the onslaught of attackers.
    Description
    Dissertation (Ph.D.) University of Alaska Fairbanks, 2012
    Date
    2012
    Type
    Dissertation
    Collections
    Computer Science

    entitlement

     
    ABOUT US|HELP|BROWSE|ADVANCED SEARCH

    The University of Alaska Fairbanks is an affirmative action/equal opportunity employer and educational institution and is a part of the University of Alaska system.

    ©UAF 2013 - 2023 | Questions? ua-scholarworks@alaska.edu | Last modified: September 25, 2019

    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.