Title „Medaus puodynės“ metodo panaudojimas sudarant perspėjamąją sistemą /
Translation of Title Using "Honey pot" method in developing a warning system.
Authors Adomavičius, Martynas
Full Text Download
Pages 83
Keywords [eng] "Honey pot" ; intrusion detection system ; IDS ; computer security
Abstract [eng] As computer applications develope, it is important to ensure computer and their network security in everyday life. This is done by using various instruments: from firewalls, intrusion detection and prevention systems to antivirus programs. With the development of security technologies hackers evolve too. They are adjusting to new security technologies - examining their operating principles, learning how to pass by them. To be able to strengthen the network or server security, we need to know the latest methods used by hackers. Often, the method used by hacker is sorted out only when losses in server or network are experienced. Hackers should be monitored to collect information about their activities, then administrators should structure and process that information to develope new methods in protecting networks and (creation of new rules for firewalls or intrusion detection systems). Firewall, intrusion detection and prevention protection system is the typical solution, but their opportunities are limited, these systems are often limited to certain acts excluding a new attack method that is not recognized. Partly to resolve these problems, „Honey pot“ approach is used. „Honey pot“ principle in short: attract and catch. Thus, using of „honey pot“ method in conjunction with firewall and intrusion detection and prevention system one can create a warning system, in which administrators analyzes the information to develope new methods of protection.
Type Master thesis
Language Lithuanian
Publication date 2010