Improving Infrastructure Security using Deceptive Technologies
Φόρτωση...
Ημερομηνία
2024-06-21
Συγγραφείς
Koutsikos, Ioannis
Τίτλος Εφημερίδας
Περιοδικό ISSN
Τίτλος τόμου
Εκδότης
Δικαιώματα
Default License
Άδειες
Παραπομπή
Παραπομπή
Περίληψη
Περίληψη
This dissertation focuses on enhancing the security of infrastructures by
applying deceptive technologies, specifically honeypots and honeytokens.
These methods are crucial in the current context of advanced cyber threats.
The study aims to bridge the gap between theoretical understanding and
practical application of these technologies, guiding system administrators on
how to effectively integrate them into their networks.
The central goal of this research is to deepen the understanding of honeypots
and honeytokens, demonstrating their significance in strengthening
cybersecurity globally. A distinctive feature of this study is the development of a
new PowerShell script that combines the functions of honeypots and
honeytokens. This script, along with other tools developed during the research,
is detailed in the Appendix.
The dissertation begins with an exploration of the evolution of cybersecurity
tools, highlighting the increasing importance of deceptive security measures in
combating sophisticated cyber threats. It then provides an in-depth analysis of
honeypots and honeytokens, discussing their roles, advantages, and limitations
within a cybersecurity framework.
An innovative contribution of this work is the formulation of an 'active defence'
strategy that integrates honeypots and honeytokens. This strategy represents a
proactive approach to cyber defence, adapting to new and evolving threats. The
practical application of this strategy is illustrated through the use of Thinkst
Canarytokens, the T-Pot platform, and the custom PowerShell script
'HoneyTrapCreator.ps1'. This script is designed to create deceptive network
elements that attract attackers to honeypots.
In summary, this dissertation offers both a theoretical expansion and practical
strategies for implementing deceptive cybersecurity measures. It provides
valuable tools and insights for practitioners to enhance their cyber defences,
thereby making a significant contribution to the protection of our digital
infrastructure.
Περιγραφή
Λέξεις-κλειδιά
Deceptive technologies, Honeypots, Honeytokens, Infrastructure security