A Client Honeypot Approach for Security Evaluation of Vietnamese Website

Only available on StudyMode
  • Download(s) : 756
  • Published : February 25, 2012
Open Document
Text Preview
INTERNATIONAL UNIVERSITY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING

A CLIENT HONEYPOT APPROACH FOR SECURITY
EVALUATION OF VIETNAMESE WEBSITE

A thesis by Nguyen Thanh Nhan Ho Viet Thien

Advisor: Dr. Van-Hau, PHAM School of Computer Science and Engineering, International University

Ho Chi Minh city, May 2010

ii

INTERNATIONAL UNIVERSITY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING

THESIS TOPIC: "A client honeypot approach for security evaluation of Vietnamese websites"

ADVISOR:

APPROVED BY: THESIS COMMITTEE

________________________________ Pham Van Hau, PhD. ________________________________

________________________________

________________________________

________________________________

iii

Acknowledgement
The first word, we would like to show our deep gratitude to Dr. Pham Van Hau – school of Computer Science and Engineering – our advisor for suggesting us this interesting topic as well as his willingness to support us throughout problems. His comprehensive knowledge and much experience help us finish this thesis successfully. The second word, we would like to give thank to the School of Computer Science and Engineering, together with the staffs for offering us a chance to work on this thesis for our graduation. Thanks for all the technical support and enthusiasm. Sincere thank to our team partner because of his hard work and cooperation. Ho Chi Minh city, May 2010

iv

Table of contents
Acknowledgement .......................................................................................... iii
 Table of contents .............................................................................................iv
 List of tables................................................................................................... vii
 List of figures................................................................................................ viii
 Abstract............................................................................................................ix
 Chapter 1 INTRODUCTION .......................................................................10
 1.1.
 Rationale.............................................................................................10
 1.2.
 Problem statement ..............................................................................11
 1.3.
 Objectives...........................................................................................12
 1.4.
 Scope of research ...............................................................................13
 1.5.
 Limitation ...........................................................................................14
 1.6.
 Structure of research...........................................................................14
 Chapter 2 LITERATURE REVIEW AND METHODOLOGY ...............16
 2.1.
 Introduction ........................................................................................16
 2.2.
 Detection Method...............................................................................18
 2.3.
 Low-Interaction Honeypots................................................................19
 2.3.1. Overview ........................................................................................19
 2.3.2. HoneyC...........................................................................................19
 2.3.3. Monkey-Spider ...............................................................................21
 2.3.4. PhoneyC .........................................................................................22
 2.4.
 High-Interaction Honeypots...............................................................23
 2.4.1. Overview ........................................................................................23
 2.4.2. Capture-HPC ..................................................................................24
 2.4.3....
tracking img