Honeypot Continuation How Can A Research Proposal

Length: 7 pages Sources: 6 Subject: Education - Computers Type: Research Proposal Paper: #57477348 Related Topics: A Modest Proposal, Port Security, Modest Proposal, Ip Address
Excerpt from Research Proposal :

g., if there is a probing attempt or general scanning on the ports). Data will also be collected from the log file of the monitoring tool and from the log of the operating system as well. According to Thomae and Bakos, honeypots also have some distinct advantages for data collection purposes, including the following:

Honeypots have no production use, most activity directed at honeypots represents genuine attacks, leading to few, if any, false positives.

Honeypots can capture all activity directed at them, allowing the detection of previously unknown attacks.

Honeypots can capture more attack data than most other intrusion-detection solutions, including (for some kinds of honeypots) shell commands, installed attack software, and even attacker-to-attacker interaction through chat servers or other communication mechanisms (Thomae & Bakos, pp. 1-2).

Honeypots facilitate this type of data analysis if properly administered. For instance, after collecting data from log files, security professionals should analyze it to determine if the honeypot detected any malicious activity; however, because reviewing lengthy log files in an inefficient approach, a program called Nebula will be employed for data analysis purposes. In this regard, Werner (2008) reports that, "Nebula is an intrusion signature generator. It can help securing a network by automatically calculating filter rules from attack traces. In a common setup nebula runs as a daemon and receives attacks from honeypots. Signatures are currently published in snort format" (p. 1). The SNORT format is an open source network intrusion prevention and detection system that uses a rule-driven language that features the advantages of signature, protocol and anomaly based inspection methods (What is SNORT?, 2008). According to these security professionals, "With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry" (What is SNORT?, p. 2).

Another advantage of the SNORT format is its speed: "The code was written to be fast. A signature isn't of much value if the generation process takes hours or days. With nebula, you should get a first revision within a few seconds. As more attacks of a kind are submitted, signatures get better and nebula will publish updated revisions" (Werner, p. 2). The signature example below provided by Werner was generated by nebula for FTP downloads during multi-stage attacks:

alert tcp any -> $HOME_NET 8555 (msg: "nebula rule 2000001 rev. 1";

content: "cmd / "; offset: 0; depth: 5;

content: " echo open "; distance: 1; within: 17;

content: ">> ii & echo user 1-1 >> ii & echo get "; distance: 13; within: 70;

content: ">> ii & echo bye >> ii & ftp -n -v -s:ii & del ii & "; distance: 2; within: 107;

sid: 2000001; rev: 1;)

According to Werner, "Nebula successfully...

...

Feeding it with input from other sources shouldn't be very difficult, though. The code archive contains a command line client which submits data from files to a nebula server. Its code can also be taken as a reference implementation for the client side part of nebula's submission protocol" (p. 3).

Chapter Summary.

This chapter provided an overview and brief description of honeypots and how they can be used to identify potential vulnerabilities in a Web site by collecting attack activity, thereby providing security professionals with the information they need to formulate improved protections and superior barriers to keep "the bad guys out." This chapter also presented a review and discussion of the four steps that will be followed to achieve the proposed study's research goal. A review of the relevant peer-reviewed, scholarly, organizational, and governmental literature concerning these issues is provided in chapter two below.

References

Baker, R. (1998, July 20). Jesse Helms's honeypot. The Nation, 267(3), 22.

Carpenter, H. & Prichard, M. (1999). The Oxford companion to children's literature. Oxford: Oxford University Press.

Hahn, R.W. & Layne-Farrar, a. (2006). The law and economics of software security. Harvard Journal of Law & Public Policy, 30(1), 283.

A honey-pot. (2008). Answers.com. [Online]. Available: http://www.answers.com/topic/honey-pot?cat=technology.

Neeley, D. (2000, March). BackOfficer Friendly. Security Management, 44(3), 34.

Spritzner, L. (2004). Honeypot solutions. [Online]. Available: http://www.tracking-hackers.com/solutions/.

Thomae, I. & Bakos, G. (2004). Analysis of the data-collection capabilities of a large-scale, distributed honeypot system. Dartmouth University. [Online]. Available: http://www.ists.dartmouth.edu/projects/honeypots/.

Werner, T. (2008). Nebula: An intrusion signature generator. nebula.mwcollect.org. [Online].…

Sources Used in Documents:

references and deter computer crime. Yale Law Journal, 112(6), 1577.


Cite this Document:

"Honeypot Continuation How Can A" (2008, July 18) Retrieved September 19, 2021, from
https://www.paperdue.com/essay/honeypot-continuation-how-can-a-28866

"Honeypot Continuation How Can A" 18 July 2008. Web.19 September. 2021. <
https://www.paperdue.com/essay/honeypot-continuation-how-can-a-28866>

"Honeypot Continuation How Can A", 18 July 2008, Accessed.19 September. 2021,
https://www.paperdue.com/essay/honeypot-continuation-how-can-a-28866

Purpose of Paperdue.com

The documents we provide are to be used as a sample, template, outline, guideline in helping you write your own paper, not to be used for academic credit. All users must abide by our "Student Honor Code" or you will be restricted access to our website.

Related Documents
Hacking Year-Old Bloomington Man Was
Words: 2757 Length: 10 Pages Topic: Education - Computers Paper #: 73679742

They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be

Hacktivism One Expression of the
Words: 2323 Length: 9 Pages Topic: Government Paper #: 19870559

Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false

Hacktivism Securing the Electronic Frontier Consider How
Words: 591 Length: 2 Pages Topic: Education - Computers Paper #: 97466184

Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by

Hacker/Hacker Techniques the Hackers in
Words: 3074 Length: 8 Pages Topic: Education - Computers Paper #: 46013389

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Hacker Hacking, Web Usage and the Internet
Words: 459 Length: 2 Pages Topic: Government Paper #: 94639271

Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.

Hacker Mitigation and Culture in the International Systems
Words: 2409 Length: 7 Pages Topic: Sports - Drugs Paper #: 87369052

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance