Research Output

Detection of network threats using honeypots.

  The increasing use of computer communication for many day to day tasks has resulted in a greater reliance on communication networks such as the Internet. The impact of a serious interruption to the operation of the Internet may have far reaching and costly consequences. The Internet has experienced several incidents caused by network worms, including an almost total shutdown by network as the result of the Morris worm in 1988. This project covers the design, implementation and evaluation of a distributed honeypot system that provides the facilities to centrally log threat information. A system of this nature may collect information regarding a threat at the early stages of infection, allowing the possibility of an effective response to be deployed. A number of software components have been developed in several programming languages including C, Perl and PHP. The prototype system run on a Linux based operating system. Experiments were performed that demonstrated the systems ability to detect new threats within a short period of their first sighting.

  • Type:


  • Date:

    30 November 2005

  • Publication Status:


  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security


Jackson, P. Detection of network threats using honeypots. (Thesis). Edinburgh Napier University. Retrieved from


data security; malware; network worms; distributed honeypot;

Available Documents