The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet
Date of Award
Doctor of Philosophy
School of Computer and Security Science
Faculty of Computing, Health and Science
Deception has long been part of an effective strategy for the guileful and determined predator. Deceptive lessons learned from the animal kingdom have since been passed over to the realm of network security. Home users and organisations alike may adopt deceptive strategies as a proactive and preventative measure for monitoring and securing wired and wireless networks. Honeypots and honeynets are digital entities that are able to emulate the behaviours and functionality of genuine computerised systems. A honeypot's ability to deceive network attack tools may alIow defenders to tailor network countermeasures according to predicted attack vectors. In this research, an exploratory study of honeynet architecture and deployment was undertaken to create a virtual network to deceive network attacks and direct an attack vector through a predetennined deception.
Yek, Suen, "The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet" (2007). Theses: Doctorates and Masters. Paper 275.