Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Molnhonungsfällan: en studie om attacker på molntjänsteleverantörsbelägna virtuella maskiner
University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
University West, Department of Engineering Science, Division of Mathematics, Computer and Surveying Engineering.
2020 (Swedish)Independent thesis Basic level (professional degree), 5 credits / 7,5 HE creditsStudent thesisAlternative title
The IT honeypots : not for bees but for hackers and bots (English)
Abstract [sv]

Denna rapport handlar om att installera honeypots hos olika leverantörer av cloud-baserade virtuella maskiner och sedan jämföra datan som man får på de olika cloud-tjänsterna och analysera den utifrån om det finns några likheter eller skillnader vad gäller attacker.

Undersökningen fokuserar på tre av de största leverantörerna av cloud-baserade virtuella maskiner: Google Cloud, Microsoft Azure och Digital Ocean.

De honeypots som använts för studien är Cowrie, Elastichoney, Dionaea och sensorn p0f, tillsammans med deployment-verktyget MHN och dataanalysverktyget Splunk.

Informationsinsamlingsprocessen utfördes över en period av 11 dagar, under datumen 2020-07-28 – 2020-08-08, med totalt 240 timmar av datainsamling.

Abstract [en]

This thesis is about installing honeypots on different providers cloud based virtual machines, gathering the data from the honeypots and comparing the data between the providers, and analyse it with regards to differences and similarities in attacks.

The study focuses on three of the largest cloud based VM providers: Google Cloud, Microsoft Azure and Digital Ocean.

The honeypots used for the study are Cowrie, Elastichoney, Dionea and the sensor p0f, along with the deployment tool MHN and the data analytics tool Splunk.

The information gathering process was performed over the period of 11 days, on the dates 2020-07-28 – 2020-08-08, with a total of 240 hours of data collection.

Place, publisher, year, edition, pages
2020. , p. 20
Keywords [en]
Honeypots, hackers, bots, Cowrie, Dionaea, Elastichoney, p0f, cyber-attacks, MHN
Keywords [sv]
Honeypot, hackare, bottar, Dionaea, Cowrie, Elastichoney, p0f, cyber attacker, MHN
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hv:diva-16185Local ID: EXN300OAI: oai:DiVA.org:hv-16185DiVA, id: diva2:1517300
Subject / course
Computer engineering
Educational program
Nätverksteknik med IT-säkerhet
Supervisors
Examiners
Available from: 2021-01-14 Created: 2021-01-13 Last updated: 2021-01-14Bibliographically approved

Open Access in DiVA

No full text in DiVA

By organisation
Division of Mathematics, Computer and Surveying Engineering
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 115 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf