NUST Institutional Repository

Cyber Threat Detection Using Raspberry-PI Honeypot

Show simple item record

dc.contributor.author Ali, Muhammad
dc.contributor.author Ghazanfar, Muhammad
dc.contributor.author Butt, Ayusha
dc.contributor.author Sohail, Hassan
dc.contributor.author Supervised by Dr. Haider Abbas
dc.date.accessioned 2020-11-03T06:47:32Z
dc.date.available 2020-11-03T06:47:32Z
dc.date.issued 2019-06
dc.identifier.other PTC-346
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/8708
dc.description.abstract The world of Technology and global data communication is changing expeditiously with time so inexpensive internet and efficient software have turned out to be one of its most encouraging upshots. Consequently, threats to personal data security and compromised privacy are becoming more and more of an issue reciprocating interests of engineers in technical security and analysis on the subject anew. This project entitled as “Cyber Threat Detection using Raspberry pi Honeypot” relates to a raspberry pi honeypot designed and deployed within a live network. The Honeypot intends to attract attackers by simulating vulnerabilities in a network and generate log files of the activities respectively. Signature based detection is performed on the log files achieved by the detection and the results are virtually displayed for analysis on a GUI. This honeypot when deployed within a network can be widely useful for administrators and network security experts in terms of collecting valuable information about a hacker’s activity and its trails can lead to building new rules and mechanisms for the prevention of similar attacks in the future. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Cyber Threat Detection Using Raspberry-PI Honeypot en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account