A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
Journal: International Journal of Trend in Scientific Research and Development (Vol.5, No. 1)Publication Date: 2021-01-21
Authors : Anil Tom M N Nachappa;
Page : 266-271
Keywords : Honeypot; Honeynet; Honeymap; Modern Honeypot Network;
Abstract
A honeypot is a widely used security control to capture and analyse malicious network traffic. The main goal of honeypot is to monitor and receive log data, which can later be used to prevent future attacks. It imitates the contact between emulated computer and attacker with the objective of acquiring sufficient data for effective analysis and potential prevention of attacks. A honeypot is used to detect intruders in many fields such as defence, Government sectors, enterprises, higher institutions, Banking sectors, Nuclear reactors and many more. There are two types of honeypots that are deployed for different uses research honeypots and production honeypots. Research honeypots are focused on gathering information about the attack, used specifically for the purpose of learning about hacking methodologies. Production honeypots, on the other hand, are focused primarily on diverting attacks from important systems. This work detects the type of the intruders, analyses their strategy and strength of the attack. The deployment of honeypot detects various kinds of attacks using different sensors. Server is deployed in the cloud environment and sensors can be deployed in either in cloud or in Raspberry pi or machine. Server displays the feeds from sensors which is placed over different locations. Live rendering of attacks is shown in the dashboard and honey map points the exact geographic locations using longitude and latitude values. These logs can be further used to analyses and take essential measures in defence perspectives. Anil Tom | Dr. M N Nachappa "A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35900.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35900/a-study-on-honeypots-and-deceiving-attacker-using-modern-honeypot-network/anil-tom
Other Latest Articles
- Problems of Drawing and Construction in Year III Mathematics Lessons
- An Analysis of The Retention of Trained Employees of The Food and Beverage Sector in The Hotel Industry
- Depression in Mothers of Children with Cerebral Palsy and Its Relation with Current Functional Status of The Children
- Evolution of Quantitative Effects of Construction Changes on Labor Productivity, Time and Cost Control Using Building Information Modeling
- Heat Transfer Characteristics of a Different Shaped Dimpled Protrusioned Pin Fin Wedge Duct for Turbine Blade using CFD
Last modified: 2021-01-22 15:52:44