[ Close ]
Username
Password


Forgotten your password?
 
Custom Search
Computer/IT Projects
 Projects Q A, Guidance for your projects » Projects Forum » Computer/IT Projects
Message Icon Topic: HONEY POT PROJECTS Post Reply Post New Topic
Found this useful? Give a +1   Add to Facebook: Add to Facebook
Free Project Downloads
CS / IT Project Downloads
.Net Project Downloads
JAVA Project Downloads
PHP Project Downloads
Networking Proj Downloads
Project Topics
Computer(CS/IT) Projects
Software Mini Project Topics
Android Project Topics
Networking Project Ideas
Dot Net Project Topics
Latest IEEE Projects List
IEEE JAVA Project Topics
Project Presentation Tips
How to choose Project Topic
Tips for Final Year Project
Steps for FYP, Mini Project
Preparing a Project Report
Problems faced in Projects
 
Get Free Software CS / IT Project Downloads:

Enter your email address:  

Author Message
tvsmahadev
Newbie
Newbie


Joined: 14-Jun-2011
Online Status: Offline
Posts: 0
Quote tvsmahadev Replybullet Topic: HONEY POT PROJECTS
    Posted: 14-Jun-2011 at 10:49am
Please any one help for doing a project based on Honey pots. I require it very urgently.

Thanking you,

Mahadev.

 
IP IP Logged
PrashanthS
Newbie
Newbie


Joined: 21-Sep-2008
Online Status: Offline
Posts: 1
Quote PrashanthS Replybullet Posted: 15-Jun-2011 at 3:43pm
came across this....might help u to get started with

Abstract:
Honeypots are an exciting new technology with enormous potential for the security community. A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. Unlike firewalls or Intrusion Detection Systems, honeypots do not solve a specific problem. Instead, they are a highly flexible tool that comes in many shapes and sizes. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit card fraud. Its is this flexibility that gives honeypots their true power. It is also this flexibility that can make them challenging to define and understand. There are several problems and challenges associated with the honeypots. Few of them are identifying honeypots, exploiting honey pots and attacker clientele. In this research paper I am going work on different ways of identifying and exploiting honeypots.

Importance:
Network Security is one the challenge that every organization is facing today. Though there are different security methods, honeypots have its own importance. I found honeypots very interesting because it is an incredibly simple concept that offers very powerful security. They are designed to capture anything that interacts with them, including tools or tactics never seen before. Unlike most security technologies, Honeypots also work in IPv6 environments. Because of their architecture, Honeypots are conceptually simple.

 
IP IP Logged
skumar
Newbie
Newbie


Joined: 19-Oct-2008
Location: United Kingdom
Online Status: Offline
Posts: 250
Quote skumar Replybullet Posted: 15-Jun-2011 at 4:06pm
Pretty interesting topic. Stumbled upon this by chance n started reserching on it. These docs give a great deal of info on it.

Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot.

Deploying physical honeypots is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypots, that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addresses. To fool network fingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary services for an arbitrary number of virtual systems. Furthermore, the system supports virtual routing topologies that allow the creation of large virtual networks including characteristics like latency and packet loss. We discuss Honeyd’s design and implementation.

A Virtual Honeypot Daemon.pdf

HoneyPots For NetworkSecurity.doc
IP IP Logged
Stranger
Groupie
Groupie


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Stranger Replybullet Posted: 22-Jun-2011 at 2:55pm
Hi Mahadev, this presentation on honeypots would be of great help to you.

Honeypots Presentation.pdf
IP IP Logged
Stranger
Groupie
Groupie


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Stranger Replybullet Posted: 23-Jun-2011 at 12:27pm
IP IP Logged
roshanvijaykar
Newbie
Newbie


Joined: 26-Jul-2011
Online Status: Offline
Posts: 0
Quote roshanvijaykar Replybullet Posted: 26-Jul-2011 at 8:44pm
sir i want a complete documentation on the
project:= Advanced Honeypot Architecture for Network Threats Quantification
IP IP Logged
Stranger
Groupie
Groupie


Joined: 21-Sep-2008
Online Status: Offline
Posts: 0
Quote Stranger Replybullet Posted: 27-Jul-2011 at 1:01am
Hi roshanvijaykar, its available as download here:

Advanced Honeypot Architecture for Network Threats Quantification
IP IP Logged

 
Post Reply Post New Topic

Free Programming Courses in JAVA, .Net and PHP (Register Now!)

Java Free Online Course

.Net Free Online Course

PHP Free Online Course


 
Printable version Printable version

Forum Jump
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot delete your posts in this forum
You cannot edit your posts in this forum
You cannot create polls in this forum
You cannot vote in polls in this forum



This page was generated in 0.031 seconds.
© ProjectsQA.com   |   Privacy policy