Abstract
With the rapid increase of technology throughout the world, there has also
been an equally rapid increases in its abuse. Currently, security professional
made some attempts to learn about attacker, however these attempts were limited
in effort and scope. They emphasis on the targeted vulnerability and how
the exploit took advantage of that vulnerability. However, very little attention
was focused on the attackers themselves. IT is necessary to study the black-hat
community’s tools, tactics, and motive and then sharing any lessons learned.
The more you know about your enemies, the better chance you have of defending
yourself against them and defeating them. A honeynet is a network
set up with intentional vulnerabilities; its purpose is to invite attack, so that
an attacker’s activities and methods can be studied and that information used
to increase network security. This paper will collect and analyse the attackers
activity, through the honeynet network and normal secured system and it will
identify if there is new attackers activities, that are not detected by the current
security tool are detected.