Presentation Title

Analyzing the Risk Level of Keene State Network by monitoring a vulnerable network called Honeynet

Presentation Type

Poster

School

School of Sciences and Social Sciences

Discipline

Computer Science

Mentor

Wei Lu

Abstract

The recent escalation of cybersecurity threats has prompted business, organizations, and governments to prioritize network and information security. Everyday millions of people, including Keene State College, are at risk to these attackers, often with motives of profits, to their cyber espionage and sabotage. Consequently, developing profiles of these attackers’ behavior has become crucial to the prevention and eradication of these threats. In the proposed project, we seek to analyze these attackers’ behaviors through vulnerable monitored networks called a honeynet. Using advanced virtualization technologies, we will be able to collect forensic data from an attack at realtime - giving us important information such as geographic distribution and service communities - which can then be given to network administrators to prevent further attacks. Likewise, since the Honeynet will be built at Keene State College, the information collected will be transferred to a monthly report that includes the risk level of our network.

Share

COinS
 

Analyzing the Risk Level of Keene State Network by monitoring a vulnerable network called Honeynet

The recent escalation of cybersecurity threats has prompted business, organizations, and governments to prioritize network and information security. Everyday millions of people, including Keene State College, are at risk to these attackers, often with motives of profits, to their cyber espionage and sabotage. Consequently, developing profiles of these attackers’ behavior has become crucial to the prevention and eradication of these threats. In the proposed project, we seek to analyze these attackers’ behaviors through vulnerable monitored networks called a honeynet. Using advanced virtualization technologies, we will be able to collect forensic data from an attack at realtime - giving us important information such as geographic distribution and service communities - which can then be given to network administrators to prevent further attacks. Likewise, since the Honeynet will be built at Keene State College, the information collected will be transferred to a monthly report that includes the risk level of our network.