NORMA eResearch @NCI Library

Using honeypots to develop an understanding of intrusion techniques

Goslin, Darragh (2024) Using honeypots to develop an understanding of intrusion techniques. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (1MB) | Preview
[thumbnail of Configuration Manual]
Preview
PDF (Configuration Manual)
Download (1MB) | Preview

Abstract

With modern systems relying upon cloud infrastructure to support enterprise networks it essential to protect these systems from attacks. As cyber threats increase in complexity it is necessary to develop methods to detect how a malicious threat actor will breach a network. Through building a better understanding of the threats we can make efforts to harden and protect the network. A honeypot is used to achieve this goal. A honeypot is a rogue endpoint on a network. It is an endpoint that is intentionally left vulnerable. By allowing this rogue system to be breached we can monitor and see the methods a malicious actor might employ. We can also see how a malicious actor will behave once they gain access to a vulnerable endpoint.

Item Type: Thesis (Masters)
Supervisors:
Name
Email
Monaghan, Mark
UNSPECIFIED
Uncontrolled Keywords: Honeypot; Cloud Computing; Intrusion Detection
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Cloud computing
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Ciara O'Brien
Date Deposited: 30 Jul 2025 08:27
Last Modified: 30 Jul 2025 08:27
URI: https://norma.ncirl.ie/id/eprint/8316

Actions (login required)

View Item View Item