Honeypots are security resources present in the network with the goal of attracting attackers and with the intention of capturing maximum information about these attacks. The information captured by the honeypots are used to study, analyze and prevent these attacks. In this thesis we have developed and implemented a honeypot as a web application with the goal to capture the attacks targeted at web applications and to study these attacks. The honeypot is capable of detecting 5 different types of attacks namely SQL Injection Attacks, Cross Site Scripting Attacks, Malicious File Upload Attacks, User Enumeration Attacks and Remote File Inclusion Attacks.
The second part of the thesis is a detailed study and analysis of the information and attacks captured by the honeypot since it has been deployed. A Honeypot Management System has been implemented which is an administrative tool to manage the captured information.
|School:||California State University, Long Beach|
|School Location:||United States -- California|
|Source:||MAI 50/03M, Masters Abstracts International|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be