0704-883-0675     |      dataprojectng@gmail.com

An Investigation into the Use of Network Honeypots for Cybersecurity Research in Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Network honeypots are decoy systems or networks set up to attract cybercriminals and hackers, providing an environment for studying their behavior and techniques. These systems are invaluable for cybersecurity research, as they allow institutions to analyze attack methods without putting their real systems at risk (Ahmed et al., 2023). Federal University, Wukari, Taraba State, recognizes the need for innovative approaches to enhance its cybersecurity defenses. Honeypots have gained popularity as an effective tool for improving threat intelligence, offering insight into new vulnerabilities, attack vectors, and hacker tactics (Chukwudi & Iman, 2024).

This research investigates the deployment and utilization of network honeypots at Federal University, Wukari, for the purpose of cybersecurity research. By collecting data on attempted attacks and analyzing hacker behavior, the university can improve its defense strategies, update security protocols, and develop a stronger understanding of potential threats.

Statement of the Problem

The increasing frequency of cyberattacks on higher education institutions calls for advanced cybersecurity research tools to enhance threat detection and response capabilities. Federal University, Wukari, currently lacks a dedicated research tool like honeypots that could help in the analysis of attack strategies. This research intends to assess the effectiveness of network honeypots in collecting valuable data to improve the university’s security measures.

Objectives of the Study

  1. To investigate the use of network honeypots for cybersecurity research at Federal University, Wukari.

  2. To analyze the data collected from honeypots to identify emerging cyber threats and attack patterns.

  3. To develop recommendations on how Federal University can incorporate honeypots into its cybersecurity strategy to enhance threat detection and response.

Research Questions

  1. How can network honeypots be effectively implemented at Federal University, Wukari for cybersecurity research?

  2. What types of cyber threats and attack methods can be identified through the use of honeypots?

  3. How can the insights gained from honeypots improve Federal University’s cybersecurity posture and incident response strategies?

Significance of the Study

This study will help Federal University, Wukari, adopt a proactive cybersecurity research strategy using honeypots. The insights gained from honeypot data will enable the university to strengthen its defenses and stay ahead of emerging threats.

Scope and Limitations of the Study

The study is limited to the implementation and analysis of network honeypots at Federal University, Wukari. It focuses solely on honeypots and does not extend to other cybersecurity research tools or methods.

Definitions of Terms

  • Network Honeypot: A system or resource intentionally exposed to attract and capture information about cyberattacks.

  • Cybersecurity Research: The process of studying threats, vulnerabilities, and defense mechanisms to improve network security.

  • Threat Intelligence: Information about potential or current cyberattacks that helps organizations understand their adversaries and strengthen defenses.





Related Project Materials

An Examination of Public Perception of Nurse Practitioners as Primary Care Providers in Gombe State

Background of the Study

The role of nurse practitioners as primary care providers is increasingly rec...

Read more
The Effect of Hashtag Campaigns on Nigerian Syntax: A Case Study of Twitter Political Movements

Background of the study
Hashtag campaigns have become central to digital political mobilization, especially on Twitter. In...

Read more
NEED FOR CREATION DEVELOPMENT AND MAINTENANCE OF GOOD BUYER SUPPLIER RELATIONSHIP

INTRODUCTION

Organization will be interested in transacting business in an environment filled with frag...

Read more
TECHNOLOGICAL CHANGE AND ITS EFFECT ON TRADITIONAL RELIGIOUS BELIEFS: THE TIV EXPERIENCE

ABSTRACT

The research was motivated by the need to review traditional beliefs of the Tiv currently undermined by the significant impact o...

Read more
GLOBALIZATION AND THE PROBLEMS OF SOCIO-ECONOMIC DEVELOPMENT IN NIGERIA

ABSTRACT

This study examined the globalization and the problems socio-socio-economic development in Nigeria. The researc...

Read more
. A Study of Newspaper Reporting on Religious Extremism in Maiduguri Local Government, Borno State

Chapter One: Introduction

1.1 Background of the Study

Religious extremism poses a significant threat to societal stability, pea...

Read more
Optimization of Computer-Based Interactive Training Modules for Cybersecurity Awareness in Jos, Plateau State

Background of the Study
Cybersecurity is a critical concern in the digital age, with organizations facing constant threats...

Read more
An Investigation into the Role of Urbanization in Increasing Obesity Prevalence in Katsina State

Background of the Study

Urbanization has been linked to a variety of lifestyle changes, many of which contribute to health problems such...

Read more
TOXICOLOGICAL, ANTIPYRETIC, ANALGESIC AND ANTI-INFLAMMATORY PROPERTIES OF METHANOL LEAF EXTRACT OF DALBERGIA SAXATILIS HOOK. F (FABACEAE) IN RATS AND MICE

ABSTRACT

The decoction of the leaves of Dalbegia saxatilis is used in Traditional Medicine for various ailments such as cough, small pox,...

Read more
An investigation of ATM monitoring systems on reducing service interruptions in banking: a case study of AB Microfinance Bank

Background of the Study
ATM monitoring systems have become essential in ensuring uninterrupted service delivery and custom...

Read more
Share this page with your friends




whatsapp