Goslin, Darragh (2024) Using honeypots to develop an understanding of intrusion techniques. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (1MB) | Preview |
Preview |
PDF (Configuration Manual)
Download (1MB) | Preview |
Abstract
With modern systems relying upon cloud infrastructure to support enterprise networks it essential to protect these systems from attacks. As cyber threats increase in complexity it is necessary to develop methods to detect how a malicious threat actor will breach a network. Through building a better understanding of the threats we can make efforts to harden and protect the network. A honeypot is used to achieve this goal. A honeypot is a rogue endpoint on a network. It is an endpoint that is intentionally left vulnerable. By allowing this rogue system to be breached we can monitor and see the methods a malicious actor might employ. We can also see how a malicious actor will behave once they gain access to a vulnerable endpoint.
Item Type: | Thesis (Masters) |
---|---|
Supervisors: | Name Email Monaghan, Mark UNSPECIFIED |
Uncontrolled Keywords: | Honeypot; Cloud Computing; Intrusion Detection |
Subjects: | Q Science > QA Mathematics > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Cloud computing Q Science > QA Mathematics > Computer software > Computer Security T Technology > T Technology (General) > Information Technology > Computer software > Computer Security |
Divisions: | School of Computing > Master of Science in Cyber Security |
Depositing User: | Ciara O'Brien |
Date Deposited: | 30 Jul 2025 08:27 |
Last Modified: | 30 Jul 2025 08:27 |
URI: | https://norma.ncirl.ie/id/eprint/8316 |
Actions (login required)
![]() |
View Item |