Improving Infrastructure Security using Deceptive Technologies

dc.contributor.authorKoutsikos, Ioannisen
dc.date.accessioned2024-06-21T10:34:24Z
dc.date.available2024-06-21T10:34:24Z
dc.date.issued2024-06-21
dc.identifier.urihttps://repository.ihu.edu.gr//xmlui/handle/11544/30480
dc.rightsDefault License
dc.subjectDeceptive technologiesen
dc.subjectHoneypotsen
dc.subjectHoneytokensen
dc.subjectInfrastructure securityen
dc.titleImproving Infrastructure Security using Deceptive Technologiesen
heal.abstractThis dissertation focuses on enhancing the security of infrastructures by applying deceptive technologies, specifically honeypots and honeytokens. These methods are crucial in the current context of advanced cyber threats. The study aims to bridge the gap between theoretical understanding and practical application of these technologies, guiding system administrators on how to effectively integrate them into their networks. The central goal of this research is to deepen the understanding of honeypots and honeytokens, demonstrating their significance in strengthening cybersecurity globally. A distinctive feature of this study is the development of a new PowerShell script that combines the functions of honeypots and honeytokens. This script, along with other tools developed during the research, is detailed in the Appendix. The dissertation begins with an exploration of the evolution of cybersecurity tools, highlighting the increasing importance of deceptive security measures in combating sophisticated cyber threats. It then provides an in-depth analysis of honeypots and honeytokens, discussing their roles, advantages, and limitations within a cybersecurity framework. An innovative contribution of this work is the formulation of an 'active defence' strategy that integrates honeypots and honeytokens. This strategy represents a proactive approach to cyber defence, adapting to new and evolving threats. The practical application of this strategy is illustrated through the use of Thinkst Canarytokens, the T-Pot platform, and the custom PowerShell script 'HoneyTrapCreator.ps1'. This script is designed to create deceptive network elements that attract attackers to honeypots. In summary, this dissertation offers both a theoretical expansion and practical strategies for implementing deceptive cybersecurity measures. It provides valuable tools and insights for practitioners to enhance their cyber defences, thereby making a significant contribution to the protection of our digital infrastructure.en
heal.academicPublisherIHUen
heal.academicPublisherIDihuen_US
heal.accessfreeen_US
heal.advisorNameBaltatzis, Dimitriosen
heal.classificationCybersecurityen
heal.committeeMemberNameSerketzis, Nikolaosen
heal.committeeMemberNameRantos, Konstantinosen
heal.dateAvailable2024-06-05
heal.generalDescriptionThis dissertation focuses on enhancing the security of infrastructures by applying deceptive technologies, specifically honeypots and honeytokens. These methods are crucial in the current context of advanced cyber threats. The study aims to bridge the gap between theoretical understanding and practical application of these technologies, guiding system administrators on how to effectively integrate them into their networks. The central goal of this research is to deepen the understanding of honeypots and honeytokens, demonstrating their significance in strengthening cybersecurity globally. A distinctive feature of this study is the development of a new PowerShell script that combines the functions of honeypots and honeytokens. This script, along with other tools developed during the research, is detailed in the Appendix. The dissertation begins with an exploration of the evolution of cybersecurity tools, highlighting the increasing importance of deceptive security measures in combating sophisticated cyber threats. It then provides an in-depth analysis of honeypots and honeytokens, discussing their roles, advantages, and limitations within a cybersecurity framework. An innovative contribution of this work is the formulation of an 'active defence' strategy that integrates honeypots and honeytokens. This strategy represents a proactive approach to cyber defence, adapting to new and evolving threats. The practical application of this strategy is illustrated through the use of Thinkst Canarytokens, the T-Pot platform, and the custom PowerShell script 'HoneyTrapCreator.ps1'. This script is designed to create deceptive network elements that attract attackers to honeypots. In summary, this dissertation offers both a theoretical expansion and practical strategies for implementing deceptive cybersecurity measures. It provides valuable tools and insights for practitioners to enhance their cyber defenses, thereby making a significant contribution to the protection of our digital infrastructure.en
heal.languageenen_US
heal.licensehttp://creativecommons.org/licenses/by-nc/4.0en_US
heal.numberOfPages61en_US
heal.publicationDate2024-01-15
heal.recordProviderSchool of Science and Technology, MSc in Cybersecurityen_US
heal.typemasterThesisen_US

Αρχεία

Πρωτότυπος φάκελος/πακέτο

Τώρα δείχνει 1 - 1 από 1
Φόρτωση...
Μικρογραφία εικόνας
Ονομα:
Diploma thesis Koutsikos - MSc Cybersecurity_final.pdf
Μέγεθος:
1.96 MB
Μορφότυπο:
Adobe Portable Document Format
Περιγραφή:

Φάκελος/Πακέτο αδειών

Τώρα δείχνει 1 - 1 από 1
Δεν υπάρχει διαθέσιμη μικρογραφία
Ονομα:
license.txt
Μέγεθος:
2.58 KB
Μορφότυπο:
Item-specific license agreed upon to submission
Περιγραφή:

Συλλογές