Μελέτη Honeypot συστημάτων με πειραματική εφαρμογή
Honeypot Systems’ study with experimental results

View/ Open
Subject
Computer networks -- Security measures ; Computer security ; Computer hackers ; Firewalls (Computer security) ; Wireless communication systems -- Security measuresAbstract
The objective of this MSc thesis is to study Honeypot systems’ functionality and how they contribute to Information Systems Security. Honeypots are defined as systems that resemble fully functional production computing systems but are actually emulators or real systems with several security vulnerabilities in order to attract attackers. Essentially they act as baits for the attackers to carry out attacks. In this context, three Honeypot Systems were installed, configured and deployed, the results of which were studied and presented in detail in tables and charts. The Honeypot Systems’ application aimed at recording the whole interaction between Honeypots and attackers in order to study the attackers’ behavior and methodology. Specifically, an SSH emulator, an HTTP emulator and one that emulates a significant number of protocols and has the ability to collect malware, were deployed. All three emulators as Honeypots presented security vulnerabilities and for this reason they became subject to attacks. All related data gathered were stored in databases and were then analysed and processed by using relational database technologies. Moreover, the basic concepts of Information Systems Security, network vulnerabilities and types of malware were studied and the most significant and recently developed Honeypot systems were presented and classified.