Lebahnet Project Q3 2018 Report

Introduction Security practitioners develop ways to detect cyber-attacks that are of potential risk to internet users. This is to secure computer system vulnerabilities, provide alerts to the community, as well as to learn on ‘the how to’ of such an attack occurring. One of the ways in detecting such malicious attack is developing a luring […]

LebahNET 2.0 – Distributed Honeypot Network

Author:(Nasim/Ramadhan/Hafiz/Shuaib) Introduction Security practitioners develop ways to detect cyber attacks that are of potential risk to Internet users. This is to secure computer system vulnerabilities, provide alerts to the community, as well as to learn on ‘the how to’ of such an attack occurring. One of the ways in detecting such malicious attack, is developing […]

LebahNET Statistic – November 2015

1. Summary CyberSecurity Malaysia has established a Honeynet project known as Lebahnet. Lebahnet is a Honeypot Based Distributed System for detecting and capturing attacks that evades traditional security devices. This project was initiated in 2002. Lebahnet as a lightweight and passive honeypot; emulate vulnerabilities of operating systems used in an enterprise to alert security administrator […]

LebahNET Statistic – October 2015

1. Summary CyberSecurity Malaysia has established a Honeynet project known as Lebahnet. Lebahnet is a Honeypot Based Distributed System for detecting and capturing attacks that evades traditional security devices. This project was initiated in 2002. Lebahnet as a lightweight and passive honeypot; emulate vulnerabilities of operating systems used in an enterprise to alert security administrator […]

LebahNET Statistic – September 2015

1. Summary CyberSecurity Malaysia has established a Honeynet project known as Lebahnet. Lebahnet is a Honeypot Based Distributed System for detecting and capturing attacks that evades traditional security devices. This project was initiated in 2002. Lebahnet as a lightweight and passive honeypot; emulate vulnerabilities of operating systems used in an enterprise to alert security administrator […]