Background of the Study
Network honeypots are decoy systems or networks set up to attract cybercriminals and hackers, providing an environment for studying their behavior and techniques. These systems are invaluable for cybersecurity research, as they allow institutions to analyze attack methods without putting their real systems at risk (Ahmed et al., 2023). Federal University, Wukari, Taraba State, recognizes the need for innovative approaches to enhance its cybersecurity defenses. Honeypots have gained popularity as an effective tool for improving threat intelligence, offering insight into new vulnerabilities, attack vectors, and hacker tactics (Chukwudi & Iman, 2024).
This research investigates the deployment and utilization of network honeypots at Federal University, Wukari, for the purpose of cybersecurity research. By collecting data on attempted attacks and analyzing hacker behavior, the university can improve its defense strategies, update security protocols, and develop a stronger understanding of potential threats.
Statement of the Problem
The increasing frequency of cyberattacks on higher education institutions calls for advanced cybersecurity research tools to enhance threat detection and response capabilities. Federal University, Wukari, currently lacks a dedicated research tool like honeypots that could help in the analysis of attack strategies. This research intends to assess the effectiveness of network honeypots in collecting valuable data to improve the university’s security measures.
Objectives of the Study
To investigate the use of network honeypots for cybersecurity research at Federal University, Wukari.
To analyze the data collected from honeypots to identify emerging cyber threats and attack patterns.
To develop recommendations on how Federal University can incorporate honeypots into its cybersecurity strategy to enhance threat detection and response.
Research Questions
How can network honeypots be effectively implemented at Federal University, Wukari for cybersecurity research?
What types of cyber threats and attack methods can be identified through the use of honeypots?
How can the insights gained from honeypots improve Federal University’s cybersecurity posture and incident response strategies?
Significance of the Study
This study will help Federal University, Wukari, adopt a proactive cybersecurity research strategy using honeypots. The insights gained from honeypot data will enable the university to strengthen its defenses and stay ahead of emerging threats.
Scope and Limitations of the Study
The study is limited to the implementation and analysis of network honeypots at Federal University, Wukari. It focuses solely on honeypots and does not extend to other cybersecurity research tools or methods.
Definitions of Terms
Network Honeypot: A system or resource intentionally exposed to attract and capture information about cyberattacks.
Cybersecurity Research: The process of studying threats, vulnerabilities, and defense mechanisms to improve network security.
Threat Intelligence: Information about potential or current cyberattacks that helps organizations understand their adversaries and strengthen defenses.
The role of nurse practitioners as primary care providers is increasingly rec...
Background of the study
Hashtag campaigns have become central to digital political mobilization, especially on Twitter. In...
INTRODUCTION
Organization will be interested in transacting business in an environment filled with frag...
ABSTRACT
The research was motivated by the need to review traditional beliefs of the Tiv currently undermined by the significant impact o...
ABSTRACT
This study examined the globalization and the problems socio-socio-economic development in Nigeria. The researc...
Chapter One: Introduction
1.1 Background of the Study
Religious extremism poses a significant threat to societal stability, pea...
Background of the Study
Cybersecurity is a critical concern in the digital age, with organizations facing constant threats...
Background of the Study
Urbanization has been linked to a variety of lifestyle changes, many of which contribute to health problems such...
ABSTRACT
The decoction of the leaves of Dalbegia saxatilis is used in Traditional Medicine for various ailments such as cough, small pox,...
Background of the Study
ATM monitoring systems have become essential in ensuring uninterrupted service delivery and custom...