Category

share

Designing and Evaluating the honeypots using virtual machine

Designing and Evaluating the honeypots using virtual machine

 

Marketed By :  LAP LAMBERT Academic Publishing   Sold By :  Kamal Books International  
Delivery in :  10-12 Business Days

 
₹ 5,066

Availability: Out of stock

 

Delivery :

5% Cashback on all Orders paid using MobiKwik Wallet T&C

Free Krispy Kreme Voucher on all Orders paid using UltraCash Wallet T&C
Product Out of Stock Subscription

(Notify me when this product is back in stock)

  • Product Description
 

In this dissertation I had explored so many different methods of building HoneyNet. Outside these methods, I look in-depth details on the UML and VMware. This dissertation illustrates tell the steps which are compulsory in inventing a HoneyPot machine. Moreover it also tells that what are the thing an administrator must watch out whilst building a HoneyPot, for example; UML fingerprinting, and VMware and security issues. I had also, demonstrated the monitoring techniques and methods to test develop. I was also clarifying the various techniques of fingerprinting that an intruder might be use for to conclude that if it is a virtual system. In addition, it also demonstrates the various ways to countermeasure fingerprinting. Therefore, making the intruder in thinking that he/she attacking on the real system. Security issues are also talk about in this dissertation. To stop the intruder from exploiting the HoneyPot system and using the system to attack on the different networks, I utilized a firewall. Also, by installing a firewall to defend the other networks. On the other hand, it is also feasible for a firewall to defend the host OS from the attacker’s within the HoneyPot system.

Product Specifications
SKU :COC17344
Country of ManufactureIndia
Product BrandLAP LAMBERT Academic Publishing
Product Packaging InfoBox
In The Box1 Piece
Product First Available On ClickOnCare.com2015-07-26
0 Review(s)