Summary, etc |
Day by day, more and more people are using internet all over the world. It is becoming a part of<br/>everyone’s life. People are checking their e-mails, surfing over internet, purchasing goods, playing<br/>online games, paying bills on the internet etc. However, while performing all these things, how many<br/>people know about security? Do they know the risk of being attacked, infecting by malicious software?<br/>Even some of the malicious software are spreading over network to create more threats by users. How<br/>many users are aware of that their computer may be used as zombie computers to target other victim<br/>systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get<br/>over all these problems. In this thesis, we will make a real life scenario, using honeypots.<br/>Honeypot is a well-designed system that attracts hackers into it. By luring the hacker into the system,<br/>it is possible to monitor the processes that are started and running on the system by hacker. In other<br/>words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The<br/>aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviors in order to<br/>create more secure systems. Honeypot is great way to improve network security administrators’<br/>knowledge and learn how to get information from a victim system using forensic tools. Honeypot is<br/>also very useful for future threats to keep track of new technology attacks.<br/> |