Network digital evidences centralization by using honeynet architecture

The main purpose of this project is to collect and centralize network's data which might be used as digital evidences for the sake the investigation. This project focuses on network rather than a computer because of the reliability of collected and centralized digital evidences. However, a comp...

Full description

Bibliographic Details
Main Author: Saleh, Mohammed Abbas Alameen
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/11360/1/MohammedAbbasAlameenMFSKSM2009.pdf
_version_ 1796854863680765952
author Saleh, Mohammed Abbas Alameen
author_facet Saleh, Mohammed Abbas Alameen
author_sort Saleh, Mohammed Abbas Alameen
collection ePrints
description The main purpose of this project is to collect and centralize network's data which might be used as digital evidences for the sake the investigation. This project focuses on network rather than a computer because of the reliability of collected and centralized digital evidences. However, a computer is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting the crime. Therefore, finding another place rather than a computer is the first contribution of this project in order to find out its advantages and disadvantages which related to the security and integrity. The key solution in this case is using Honeynets which guarantee reliable digital evidences. Honeywall is the most important component of Honeynet Architecture which is used as a network gateway in hidden manner. However, Honeywall stealthy is achieved from working under Bridging Mode of networking; which is not assigned Internet Protocol and also keeps it to be undetectable from the outside world. Several tools are installed and set up inside Honeywall in order to achieve project aim. Some of these tools are Snort application, Sebek Sever/ Client Architecture, and Log Server Architecture. Snort application used in this project to collect and then centralize the network data into data base. These data is comprehensive all both; encrypted and unencrypted data. Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. The functionality of Log Server is to record what happened inside Servers like current status of the servers processes registered with time and last accesses, and errors and etc. The second contribution of this project is making a comparison among three types of Honeynets in terms of security, time, and cost of network evidences. The final objective to produce guidelines which guide and govern network evidences collection and centralization processes and procedures.
first_indexed 2024-03-05T18:20:24Z
format Thesis
id utm.eprints-11360
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-03-05T18:20:24Z
publishDate 2009
record_format dspace
spelling utm.eprints-113602018-06-04T09:53:27Z http://eprints.utm.my/11360/ Network digital evidences centralization by using honeynet architecture Saleh, Mohammed Abbas Alameen QA75 Electronic computers. Computer science The main purpose of this project is to collect and centralize network's data which might be used as digital evidences for the sake the investigation. This project focuses on network rather than a computer because of the reliability of collected and centralized digital evidences. However, a computer is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting the crime. Therefore, finding another place rather than a computer is the first contribution of this project in order to find out its advantages and disadvantages which related to the security and integrity. The key solution in this case is using Honeynets which guarantee reliable digital evidences. Honeywall is the most important component of Honeynet Architecture which is used as a network gateway in hidden manner. However, Honeywall stealthy is achieved from working under Bridging Mode of networking; which is not assigned Internet Protocol and also keeps it to be undetectable from the outside world. Several tools are installed and set up inside Honeywall in order to achieve project aim. Some of these tools are Snort application, Sebek Sever/ Client Architecture, and Log Server Architecture. Snort application used in this project to collect and then centralize the network data into data base. These data is comprehensive all both; encrypted and unencrypted data. Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. The functionality of Log Server is to record what happened inside Servers like current status of the servers processes registered with time and last accesses, and errors and etc. The second contribution of this project is making a comparison among three types of Honeynets in terms of security, time, and cost of network evidences. The final objective to produce guidelines which guide and govern network evidences collection and centralization processes and procedures. 2009-10 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/11360/1/MohammedAbbasAlameenMFSKSM2009.pdf Saleh, Mohammed Abbas Alameen (2009) Network digital evidences centralization by using honeynet architecture. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems.
spellingShingle QA75 Electronic computers. Computer science
Saleh, Mohammed Abbas Alameen
Network digital evidences centralization by using honeynet architecture
title Network digital evidences centralization by using honeynet architecture
title_full Network digital evidences centralization by using honeynet architecture
title_fullStr Network digital evidences centralization by using honeynet architecture
title_full_unstemmed Network digital evidences centralization by using honeynet architecture
title_short Network digital evidences centralization by using honeynet architecture
title_sort network digital evidences centralization by using honeynet architecture
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/11360/1/MohammedAbbasAlameenMFSKSM2009.pdf
work_keys_str_mv AT salehmohammedabbasalameen networkdigitalevidencescentralizationbyusinghoneynetarchitecture