The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet
Date of Award
Doctor of Philosophy
School of Computer and Security Science
Faculty of Computing, Health and Science
Deception has long been part of an effective strategy for the guileful and determined predator. Deceptive lessons learned from the animal kingdom have since been passed over to the realm of network security. Home users and organisations alike may adopt deceptive strategies as a proactive and preventative measure for monitoring and securing wired and wireless networks. Honeypots and honeynets are digital entities that are able to emulate the behaviours and functionality of genuine computerised systems. A honeypot's ability to deceive network attack tools may alIow defenders to tailor network countermeasures according to predicted attack vectors. In this research, an exploratory study of honeynet architecture and deployment was undertaken to create a virtual network to deceive network attacks and direct an attack vector through a predetennined deception.
Access to this thesis - the full text is restricted to current ECU staff and students only. Email request to firstname.lastname@example.org
Yek, S. (2007). The development of an attack vector using applied levels of deceptive strategy for directing attack in a honeynet. Retrieved from http://ro.ecu.edu.au/theses/275
Access to this thesis is restricted. Please see the Access Note below for access details.