Chiara De Novellis
Analysis of application layer attacks on honeypot logs.
Rel. Marco Mellia. Politecnico di Torino, Corso di laurea magistrale in Communications And Computer Networks Engineering (Ingegneria Telematica E Delle Comunicazioni), 2022
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
Nowadays, the urge for an insight in suspicious traffic traveling on the networks is becoming a main issue in the cyber security field. Taking advantage of a monitoring infrastructure already installed comprising passive and active sensors, such as Darknets and honeypots, we focus on a specific one, the Heralding honeypot. Honeypots are becoming a classical tool in cyber security policies since they can be useful to monitor and identify new attacks. More specifically, they are placed in the internet and build ad-hoc to be attacked, usually miming the behavior of unsafe system and so interacting with the incoming traffic. A comprehensive analysis of this collected data by honeypot, gives the possibility to observe closer new arising bot nets or DDoS attacks.
The aim of this work is to provide an insight of the information collected by the Heralding, such as who attacks, with which frequency and so on
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
URI
![]() |
Modifica (riservato agli operatori) |
