Project title: Do the Dictionary, Brute force and Hybrid attacks still in use nowadays or they do not exist anymore?
Introduction (3900 words, 13 pages)
{{ Hello there, I think I have to thank you because you are going to do this work for me. Secondly, I need to remind you that is my dissertation and it’s really important to me, and this is the first part of it (the introduction) and sure the following is going to be the rest of my project, so please take care of it and I wish I can stick with same writer.
All I want to say that, the introduction will be divided into 8 chapters but the first chapter is the most important one. I have written the main idea and please try to rewrite it. And about the reference please try to take from books and journal papers and I will write some of them :
? Spitzner, Lance. foreword by Marcus J. Ranum. (2003) Honeypot: Tracking Hackers. US: Pearson Education, Inc.
? Provos, Niels. and Holz, Thorsten. (2008) Virtual Honeypot: Pearson Education, Inc.
Thanks again}}
1. Chapter 1: Introduction about what I am going to do exactly (show that I will use Honeypot to prove the title [Project title: Do the Dictionary, Brute force and Hybrid attacks still in use nowadays or they do not exist anymore]).
Please try to rewrite this as a chapter 1:
2. {{ Abstract:
IT Security instantly becomes an issue for anyone who connects their system to the Internet, either via a corporate network, an Internet Service Provider (ISP) from home or wireless device that can be used virtually anywhere when there are wireless access points. Security threats range from hacking intrusions, denial of service attacks to computer worms, viruses and more. We must understand that intrusion to a network or system can never be eliminated but however, can be reduced. Computer crimes are always increasing. Countermeasures are developed to detect or prevent attacks – most of these measures are based on known facts, known attack patterns – as in the military, it is important to know who your enemy is, what kind of strategy he uses, what tools he uses and what he is aiming for – by knowing attack strategies, countermeasures can be improved and vulnerabilities can be fixed.
In order to do that, we have to do something which can allow us to learn from hacker’s activities. One of these methods is Traps and Deceptive measures. Traps and Deceptive measures are measures that appear to be real systems, services, environments, and so forth, but they’re not. Honeypot is a good example of Traps and Deceptive measures.
A Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network but which is actually isolated, unprotected, and monitored, and which seems to contain information or a resource that would be of value to attackers.
In this project, as it been shown from the title I would like to prove that different kinds of login’s penetrated methods are still in use or the other way around. In order to prove that, these steps must be followed. First of all, design a vulnerable website and turn a personal PC to web server (easy to monitor), and then put the website on the internet. Secondly, extracting the information from the log file of the system and any other monitoring tools that can be used in the system, then the analysis stage which is going to be like comparing the results. Finally, the decision must be taken depending on the results.
3. The overall aims of the project are to gain a full understanding of traps and deceptive measures using Honeypot as an example. By doing that in a real environment.
4. Target objectives: the project will deliver the following documents
? A literature review of IT security and Deceptive measures.
? A literature review of Honeypot.
? A literature review of Dictionary, Brute force and Hybrid attacks.
? The designing of a website (the vulnerable website).
? Compare and contrast between different results.
5. Tasks: the following tasks will be carried out
? Studying and understanding, Traps and Deceptive measures, and different kinds of Honeypot, and finally the legal issues of it.
? Designing a website, setting up a web server in my own laptop, and finally configuration of the router, firewall to open port 80 to allow people from outside to access my website.
6. Milestones for the tasks will be as the following
? Four weeks to study, understand, read about the topic and find some good resources.
? Two weeks to design a website and make a configuration for the router and the firewall, and I may ask the ISP Company to open port 80.
? Six weeks to write the final dissertation.
7. Recourse requirements
? Laptop.
? Direct internet connection, otherwise I need to do Port Forwarding to open port 80.
? Software for designing the website (Dreamweaver as an example).
? Software for forwarding port 80 (PF as an example).
? Domain name.
}}}
2. Chapter 2: What is the Honeypot?
(Define the term Honeypot + General idea about Honeypot).
3. Chapter 3: Different kinds of Honeypot:
Two main classifications:
1. Depend on purpose:
i. Research Honeypot.
ii. Production Honeypot.
2. Depend on interaction:
i. Low-interaction.
ii. Medium-interaction.
iii. High-interaction.
3. Chapter 4: How it works.
4. Chapter 5: The benefits of implementing Honeypot.
5. Chapter 6: Taking Website Honeypot as an example.
6. Chapter 7: Legal issues.
7. Chapter 8: Definition and historical background about these terms, Dictionary, Brute force and Hybrid attacks.
There are faxes for this order.