Author

Jose Salcedo

Abstract

Honeypots are a relatively new way to deal with threats but in a very peculiar way; they are not a solution themselves as they don't solve a problem, rather than that Honeypots are flexible tools that can be used to collect information about the way an attack can affect the network. To achieve this Honeypots should be an easy target for attackers, and that's the reason why certain precautions must be taken when using one of these tools to avoid a problem bigger than a solution. In this paper it's going to be tested the effect that the implementation of a honeypot or honeynet can have in a production network under two security scenarios: a protected network vs an unprotected one.

Library of Congress Subject Headings

Computer security; Computer networks--Security measures

Publication Date

2010

Document Type

Thesis

Advisor

Yuan, Bo

Advisor/Committee Member

Border, Charles

Advisor/Committee Member

Pan, Yin

Comments

Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.

Campus

RIT – Main Campus

Share

COinS