• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis.

    Thumbnail
    View/Open
    Muhumuza-COCIS-Mcs.pdf (3.044Mb)
    Date
    2018-12-07
    Author
    Muhumuza, Allan
    Metadata
    Show full item record
    Abstract
    As the technological change leads to the use of information systems to store and process data, the need to protect the systems becomes very important as it can cause to data leakage, disruption in processing among other things which then lead to financial losses and endangering of the persons whose information has been leaked. Honey Pots are one of the ways these information systems can be protected from authorized access through understanding the motives of the attacker and the methods being used to try access the systems. With this information collected, the production system can be hardened and information protected. This project helped develop a Honeypot detection system that helps the honeypot developers check the built honeypots and harden them to prevent them from being detected by the attackers. The honeypot detection tool was tested on windows honeypots that are currently in use, a production server was used a control environment and the results showed that honeypots in production can be detected by the hackers. Honeypots that are not easily detectable are important as they help organizations to collect lots of data on the methods the attackers are likely to use, and the information being targeted by the hackers. The loop holes in these areas can then be patched to keep the information systems safe. The project also proposes a high level model on how honeypots for windows systems can be made undetectable and lead to the collection of more information about the attack, this model can also be replicated in the systems that are being operated by the rganizations.
    URI
    http://hdl.handle.net/10570/10994
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV