44,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
22 °P sammeln
  • Broschiertes Buch

In this dissertation I had explored so many different methods of building HoneyNet. Outside these methods, I look in-depth details on the UML and VMware. This dissertation illustrates tell the steps which are compulsory in inventing a HoneyPot machine. Moreover it also tells that what are the thing an administrator must watch out whilst building a HoneyPot, for example; UML fingerprinting, and VMware and security issues. I had also, demonstrated the monitoring techniques and methods to test develop. I was also clarifying the various techniques of fingerprinting that an intruder might be use…mehr

Produktbeschreibung
In this dissertation I had explored so many different methods of building HoneyNet. Outside these methods, I look in-depth details on the UML and VMware. This dissertation illustrates tell the steps which are compulsory in inventing a HoneyPot machine. Moreover it also tells that what are the thing an administrator must watch out whilst building a HoneyPot, for example; UML fingerprinting, and VMware and security issues. I had also, demonstrated the monitoring techniques and methods to test develop. I was also clarifying the various techniques of fingerprinting that an intruder might be use for to conclude that if it is a virtual system. In addition, it also demonstrates the various ways to countermeasure fingerprinting. Therefore, making the intruder in thinking that he/she attacking on the real system. Security issues are also talk about in this dissertation. To stop the intruder from exploiting the HoneyPot system and using the system to attack on the different networks, I utilized a firewall. Also, by installing a firewall to defend the other networks. On the other hand, it is also feasible for a firewall to defend the host OS from the attacker s within the HoneyPot system.
Autorenporträt
Engr.Danish Jamil has received B.S degree in Computer Engineering from Sir Syed University of Engineering and Technology Karachi, Pakistan in March 2007 & then he Completed his Masters in Ethical Hacking and Computer Security from University of Abertay Dundee, Scotland UK in July 2011.He has Published 08 International Research Papers to his credit.