Network Isolation and Security Using Honeypot
| Main Author: | Foo, Ce Sheng |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3694/ http://eprints.utar.edu.my/3694/1/fyp_CN_2019_FCS_1505137.pdf |
Similar Items
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)
by: Amran, Salleh
Published: (2005)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Reducing honeypot log storage capacity using cron job with PERL-SCRIPT / Nur Muhammad Irfan Abu Hassan
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
Network utilisation and security monitoring using SNMP
by: Ling, Wei Joon
Published: (2020)
by: Ling, Wei Joon
Published: (2020)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
An analysis of TCP Port 0 traffic and net BIOS SMB spam advertisement incidents within a set of honeypots / Emran Mohd Tamil and Abdul Hamid Othman
by: Mohd Tamil, Emran, et al.
Published: (2006)
by: Mohd Tamil, Emran, et al.
Published: (2006)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks
by: Mohamad Nazim, Jambli, et al.
Published: (2013)
by: Mohamad Nazim, Jambli, et al.
Published: (2013)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Predictive mobility management using optiminized delays and security enhancement in IEEE 802.11 infrastructure networks
by: Biju, Issac
Published: (2008)
by: Biju, Issac
Published: (2008)
Network topology visualizor using server flow affinity
by: Foo, Mun Yao
Published: (2020)
by: Foo, Mun Yao
Published: (2020)
An investigation into privacy and security in online social networking sites among IIUM students
by: Abdullahi, Husein Osman, et al.
Published: (2012)
by: Abdullahi, Husein Osman, et al.
Published: (2012)
Design and development of a secured electronic fingerprint voting system
by: Foo, Hong Zee
Published: (2021)
by: Foo, Hong Zee
Published: (2021)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Smart Security Camera Using Machine Learning
by: Foo, Jia Lim
Published: (2019)
by: Foo, Jia Lim
Published: (2019)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)
by: Hamid Ali, Firkhan Ali
Published: (2004)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
by: Adnan, Shahid Khan
Published: (2014)
by: Adnan, Shahid Khan
Published: (2014)
Zero-day detection on IOT networks
by: Oh, Jia Sheng
Published: (2024)
by: Oh, Jia Sheng
Published: (2024)
Reliable data collection protocol for self-powered wireless sensor network in agriculture monitoring
by: Ng, Chor Sheng
Published: (2013)
by: Ng, Chor Sheng
Published: (2013)
Secure data communication using blind source separation
by: Kumar, Anil, et al.
Published: (2008)
by: Kumar, Anil, et al.
Published: (2008)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Malaysia's strategic food security approach
by: Tey, Yeong Sheng
Published: (2010)
by: Tey, Yeong Sheng
Published: (2010)
Food security requires national leadership
by: Yeong, Sheng Tey
Published: (2023)
by: Yeong, Sheng Tey
Published: (2023)
Security issues of wireless sensor networks in healthcare applications
by: Ng, H. S., et al.
Published: (2006)
by: Ng, H. S., et al.
Published: (2006)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
Similar Items
-
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005) -
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020) -
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)