Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
This project is using a honeypot as a tool to detect internal network attack at Faculty of Information Technology and Quantitative Science, (FTMSK). The purpose of this project is to know how secure the FTMSK internal network is. Honeypots are used to detect attack that enables the automated dete...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2005
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/1695/1/PPb_MUHAMAD%20RIZAL%20AZALI%20CS%2005_5%20P01.pdf |
_version_ | 1825733631211995136 |
---|---|
author | Azali, Muhamad Rizal |
author_facet | Azali, Muhamad Rizal |
author_sort | Azali, Muhamad Rizal |
collection | UITM |
description | This project is using a honeypot as a tool to detect internal network attack at Faculty of
Information Technology and Quantitative Science, (FTMSK). The purpose of this
project is to know how secure the FTMSK internal network is. Honeypots are used to
detect attack that enables the automated detection from any malicious and unknown
attack over the internal network. We classify the attack at the lecturer's computers by
using different tools of honeypots and make analysis of it. This project is used the
Windows platform as the operating system that match with the honeypots tools. We
tested and compared among of many honeypots tools and concluded that KFsensor is the
best honeypot tool. We also defined the advantages of used the different tools of the
honeypot. The research found the internal network of FTMSK is secured and if
connection made by other host will detect. This project also gave the information for
lecturers to know how secured their computers are.
IV |
first_indexed | 2024-03-06T01:19:59Z |
format | Thesis |
id | oai:ir.uitm.edu.my:1695 |
institution | Universiti Teknologi MARA |
language | English |
last_indexed | 2024-03-06T01:19:59Z |
publishDate | 2005 |
record_format | dspace |
spelling | oai:ir.uitm.edu.my:16952019-07-22T02:51:48Z https://ir.uitm.edu.my/id/eprint/1695/ Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali Azali, Muhamad Rizal Electronic Computers. Computer Science This project is using a honeypot as a tool to detect internal network attack at Faculty of Information Technology and Quantitative Science, (FTMSK). The purpose of this project is to know how secure the FTMSK internal network is. Honeypots are used to detect attack that enables the automated detection from any malicious and unknown attack over the internal network. We classify the attack at the lecturer's computers by using different tools of honeypots and make analysis of it. This project is used the Windows platform as the operating system that match with the honeypots tools. We tested and compared among of many honeypots tools and concluded that KFsensor is the best honeypot tool. We also defined the advantages of used the different tools of the honeypot. The research found the internal network of FTMSK is secured and if connection made by other host will detect. This project also gave the information for lecturers to know how secured their computers are. IV 2005 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/1695/1/PPb_MUHAMAD%20RIZAL%20AZALI%20CS%2005_5%20P01.pdf Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali. (2005) Degree thesis, thesis, Universiti Teknologi MARA. |
spellingShingle | Electronic Computers. Computer Science Azali, Muhamad Rizal Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title | Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title_full | Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title_fullStr | Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title_full_unstemmed | Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title_short | Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali |
title_sort | using honeypots to detect internal attacks at ftmsk muhamad rizal azali |
topic | Electronic Computers. Computer Science |
url | https://ir.uitm.edu.my/id/eprint/1695/1/PPb_MUHAMAD%20RIZAL%20AZALI%20CS%2005_5%20P01.pdf |
work_keys_str_mv | AT azalimuhamadrizal usinghoneypotstodetectinternalattacksatftmskmuhamadrizalazali |