HONEYPOTS - HONEYTRAPS (Network Security) By S.VAMSHI...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
HONEYTRAPS (Network Security ) By S.VAMSHI KRISHNA & CH. GOUTHAM REDDY (goutham_pkl@yahoo.com) 2/4 B-TECH VAAGDEVI COLLEGE OF ENGINEERING BOLLIKUNTA , WARANGAL
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CONTENTS 1. History of the Discipline 2 . What is Computer Forensics 2.1 Definition 2.2 Keywords 3 . Why Computer Forensics 3.1 Introduction 3.2 Evolution 4 . What are Honeytraps 4.1 Data Capture 4.2 Profiling Specific Black hats 4.3 Letting them In or Inviting them In 5 . Architectures 5.1 Serial architecture. 5.2. Parallel architecture. 6 . Contribution to the paper. 6.1. Testing and Integration 6.2. Creating a Blackhat’s Signature 6.3. Blackhat Blueprint 7. Observation 2
Background image of page 2
HONEYTRAPS- A NETWORK FORENSIC TOOL ABSTRACT W orld cultures are forming ever-increasing dependencies on digital systems and networks. This dependency is becoming commonplace and in some cases necessary in many people’s normal day-to-day activities. Much like other cultural changes that have moved in to modify our lives, the availability of digital technology inevitably leads to misuse by anti-social or nefarious individuals as well as ordinary citizens. This paper addresses the growing need for incorporating scientifically based approaches to conducting forensic analysis in the digital world rather than developing digital technologies and then adapting them to benefit from forensic analysis techniques. First discussed is society’s current perception of forensic science. Next is a historical view of forensic science, pointing to the need for incorporating a more rigorous approach to digital analysis using forensic techniques. This paper emphasizes on one of the computer forensic method Honeytraps and discusses about the architectures of honeytraps. The paper ends with our observation and contribution i.e., Demo environment for implementing Honeytraps, thereby stressing importance of computer forensic field. 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1. History of the discipline: The roots of computer forensics start with the first time a system administrator had to figure out how and what a hacker had done to gain unauthorized access to explore the system. This was mainly a matter of discovering the incursion, stopping the incursion if it was still in progress, hunting down the hacker to chastise him or her, and fixing the problem allowing the unauthorized access to begin with A lot has evolved with computers since 1976. One item of significance is the Internet. This information superhighway has become a major passage of items that fall under legal scrutiny. 2. What is Computer Forensics? 2.1. Definition: Computer Forensics is the use of specialized techniques for recovery, authentication, and analysis of electronic data when a case involves issues relating to reconstruction of computer usage, examination of residual data, and authentication of data by technical analysis or explanation of technical features of data and computer usage. 2.2. Keywords:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2011 for the course IT 101 taught by Professor Dontknow during the Spring '07 term at Northern Virginia.

Page1 / 15

HONEYPOTS - HONEYTRAPS (Network Security) By S.VAMSHI...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online