Honeypots: A Means of Sensitizing Awareness of Cybersecurity Concerns
Zymberi, Ilirjana (2021)
Zymberi, Ilirjana
2021
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-202105016540
https://urn.fi/URN:NBN:fi:amk-202105016540
Tiivistelmä
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and develop novel ways to cause disruptions across networks, systems, and devices. To counter these disruptions, there is a need to find new ways of detecting and defending.
The objective of this thesis was to gain an understanding of current threats facing cybersecurity and to identify the usefulness of honeypot systems in a network. The goal was to set up two honeypots, the first one being the DShield Honeypot system installed and set up on a Raspberry Pi, which ran for five days. The second honeypot system, T-Pot, installed on a dedicated laptop ran for six days. These honeypot systems were deployed on a private network for research purposes to gain data of threat actors, such as source IP addresses, country of origin or the exploits used.
Using this data, an analysis of the results was conducted, providing an insight and understanding into cybersecurity threats facing a network. In conclusion, the study has given understanding of how honeypots can work as a valuable resource in securing networks.
The objective of this thesis was to gain an understanding of current threats facing cybersecurity and to identify the usefulness of honeypot systems in a network. The goal was to set up two honeypots, the first one being the DShield Honeypot system installed and set up on a Raspberry Pi, which ran for five days. The second honeypot system, T-Pot, installed on a dedicated laptop ran for six days. These honeypot systems were deployed on a private network for research purposes to gain data of threat actors, such as source IP addresses, country of origin or the exploits used.
Using this data, an analysis of the results was conducted, providing an insight and understanding into cybersecurity threats facing a network. In conclusion, the study has given understanding of how honeypots can work as a valuable resource in securing networks.