dc.contributor.author | Ali, Muhammad | |
dc.contributor.author | Ghazanfar, Muhammad | |
dc.contributor.author | Butt, Ayusha | |
dc.contributor.author | Sohail, Hassan | |
dc.contributor.author | Supervised by Dr. Haider Abbas | |
dc.date.accessioned | 2020-11-03T06:47:32Z | |
dc.date.available | 2020-11-03T06:47:32Z | |
dc.date.issued | 2019-06 | |
dc.identifier.other | PTC-346 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/8708 | |
dc.description.abstract | The world of Technology and global data communication is changing expeditiously with time so inexpensive internet and efficient software have turned out to be one of its most encouraging upshots. Consequently, threats to personal data security and compromised privacy are becoming more and more of an issue reciprocating interests of engineers in technical security and analysis on the subject anew. This project entitled as “Cyber Threat Detection using Raspberry pi Honeypot” relates to a raspberry pi honeypot designed and deployed within a live network. The Honeypot intends to attract attackers by simulating vulnerabilities in a network and generate log files of the activities respectively. Signature based detection is performed on the log files achieved by the detection and the results are virtually displayed for analysis on a GUI. This honeypot when deployed within a network can be widely useful for administrators and network security experts in terms of collecting valuable information about a hacker’s activity and its trails can lead to building new rules and mechanisms for the prevention of similar attacks in the future. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Cyber Threat Detection Using Raspberry-PI Honeypot | en_US |
dc.type | Technical Report | en_US |