Cyber Ranges: A design and implementation of Virtual Honeypots

Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. Toda...

Full description

Bibliographic Details
Main Author: Salam, Haris
Format: Others
Language:English
Published: KTH, Kommunikationsnät 2013
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137108
id ndltd-UPSALLA1-oai-DiVA.org-kth-137108
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-1371082013-12-12T04:54:33ZCyber Ranges: A design and implementation of Virtual HoneypotsengSalam, HarisKTH, Kommunikationsnät2013Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. Today,Honeypots are gaining attention and the usage of these systems is increasing.Honeypots are, essentially traps, set to detect, deflect, or in some manner counteractattempts to access and use information systems. They mostly consistof a network device that appears to be part of the network, but it is actuallyseparated and monitored by security researchers continuously to review theactivities.This thesis covers the commercial design, implementation and future directionsof these systems. An introduction to the topic is given, explaining basicsecurity concepts and vulnerabilities and flaws that lead to attacks.We set-up a set of vulnerable environment and virtual routers, where thelearners could practice offensive and defensive security techniques for cyberwarfare. A simulation was created; several machines and routers were connectedtogether. Each router is deliberately set-up so that it has (security) vulnerabilities.Practitioners will be required to penetrate in those routers and systems. Theseranges are specifically designed for the defense sector and it caters the internetand network security. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137108EES Examensarbete / Master Thesis ; XR-EE-LCN 2013:010application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
description Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. Today,Honeypots are gaining attention and the usage of these systems is increasing.Honeypots are, essentially traps, set to detect, deflect, or in some manner counteractattempts to access and use information systems. They mostly consistof a network device that appears to be part of the network, but it is actuallyseparated and monitored by security researchers continuously to review theactivities.This thesis covers the commercial design, implementation and future directionsof these systems. An introduction to the topic is given, explaining basicsecurity concepts and vulnerabilities and flaws that lead to attacks.We set-up a set of vulnerable environment and virtual routers, where thelearners could practice offensive and defensive security techniques for cyberwarfare. A simulation was created; several machines and routers were connectedtogether. Each router is deliberately set-up so that it has (security) vulnerabilities.Practitioners will be required to penetrate in those routers and systems. Theseranges are specifically designed for the defense sector and it caters the internetand network security.
author Salam, Haris
spellingShingle Salam, Haris
Cyber Ranges: A design and implementation of Virtual Honeypots
author_facet Salam, Haris
author_sort Salam, Haris
title Cyber Ranges: A design and implementation of Virtual Honeypots
title_short Cyber Ranges: A design and implementation of Virtual Honeypots
title_full Cyber Ranges: A design and implementation of Virtual Honeypots
title_fullStr Cyber Ranges: A design and implementation of Virtual Honeypots
title_full_unstemmed Cyber Ranges: A design and implementation of Virtual Honeypots
title_sort cyber ranges: a design and implementation of virtual honeypots
publisher KTH, Kommunikationsnät
publishDate 2013
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137108
work_keys_str_mv AT salamharis cyberrangesadesignandimplementationofvirtualhoneypots
_version_ 1716617272040095744