Improving Infrastructure Security using Deceptive Technologies

Φόρτωση...
Μικρογραφία εικόνας

Ημερομηνία

2024-06-21

Συγγραφείς

Koutsikos, Ioannis

Τίτλος Εφημερίδας

Περιοδικό ISSN

Τίτλος τόμου

Εκδότης

Δικαιώματα

Default License

Άδειες

Παραπομπή

Παραπομπή

Περίληψη

Περίληψη

This dissertation focuses on enhancing the security of infrastructures by applying deceptive technologies, specifically honeypots and honeytokens. These methods are crucial in the current context of advanced cyber threats. The study aims to bridge the gap between theoretical understanding and practical application of these technologies, guiding system administrators on how to effectively integrate them into their networks. The central goal of this research is to deepen the understanding of honeypots and honeytokens, demonstrating their significance in strengthening cybersecurity globally. A distinctive feature of this study is the development of a new PowerShell script that combines the functions of honeypots and honeytokens. This script, along with other tools developed during the research, is detailed in the Appendix. The dissertation begins with an exploration of the evolution of cybersecurity tools, highlighting the increasing importance of deceptive security measures in combating sophisticated cyber threats. It then provides an in-depth analysis of honeypots and honeytokens, discussing their roles, advantages, and limitations within a cybersecurity framework. An innovative contribution of this work is the formulation of an 'active defence' strategy that integrates honeypots and honeytokens. This strategy represents a proactive approach to cyber defence, adapting to new and evolving threats. The practical application of this strategy is illustrated through the use of Thinkst Canarytokens, the T-Pot platform, and the custom PowerShell script 'HoneyTrapCreator.ps1'. This script is designed to create deceptive network elements that attract attackers to honeypots. In summary, this dissertation offers both a theoretical expansion and practical strategies for implementing deceptive cybersecurity measures. It provides valuable tools and insights for practitioners to enhance their cyber defences, thereby making a significant contribution to the protection of our digital infrastructure.

Περιγραφή

Λέξεις-κλειδιά

Deceptive technologies, Honeypots, Honeytokens, Infrastructure security

Παραπομπή

Συλλογές