Date of Award
1-1-2007
Document Type
Thesis - ECU Access Only
Publisher
Edith Cowan University
Degree Name
Doctor of Philosophy
School
School of Computer and Security Science
Faculty
Faculty of Computing, Health and Science
Abstract
Deception has long been part of an effective strategy for the guileful and determined predator. Deceptive lessons learned from the animal kingdom have since been passed over to the realm of network security. Home users and organisations alike may adopt deceptive strategies as a proactive and preventative measure for monitoring and securing wired and wireless networks. Honeypots and honeynets are digital entities that are able to emulate the behaviours and functionality of genuine computerised systems. A honeypot's ability to deceive network attack tools may alIow defenders to tailor network countermeasures according to predicted attack vectors. In this research, an exploratory study of honeynet architecture and deployment was undertaken to create a virtual network to deceive network attacks and direct an attack vector through a predetennined deception.
Recommended Citation
Yek, S. (2007). The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet. Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/275