The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet

Date of Award


Degree Type


Degree Name

Doctor of Philosophy


School of Computer and Security Science


Faculty of Computing, Health and Science


Deception has long been part of an effective strategy for the guileful and determined predator. Deceptive lessons learned from the animal kingdom have since been passed over to the realm of network security. Home users and organisations alike may adopt deceptive strategies as a proactive and preventative measure for monitoring and securing wired and wireless networks. Honeypots and honeynets are digital entities that are able to emulate the behaviours and functionality of genuine computerised systems. A honeypot's ability to deceive network attack tools may alIow defenders to tailor network countermeasures according to predicted attack vectors. In this research, an exploratory study of honeynet architecture and deployment was undertaken to create a virtual network to deceive network attacks and direct an attack vector through a predetennined deception.

Access Note

Access to this thesis - the full text is restricted to current ECU staff and students only. Email request to library@ecu.edu.au

Access to this thesis is restricted. Please see the Access Note below for access details.