ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Web-based Honeypot Tool for Website Analysis

Journal: International Journal of Science and Research (IJSR) (Vol.7, No. 5)

Publication Date:

Authors : ; ; ; ; ;

Page : 243-245

Keywords : Methodologies; Honeyd; Spammers; Proxies; Knowledge;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks. Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks. This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. Honeypots are a modern approach to network security. A honeypot is used in the area of internet security and cryptography. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used implementations. It can be deployed to attract and divert an attacker from their real targets. Honeypots have the big advantage that they do not generate false alerts as each observed traffic is doubtful, because no productive components are running on the system. This fact enables the system to log every byte that flows through the network through and from the honeypot, and to relate this data with other sources to draw a picture of an attack and the attacker.

Last modified: 2021-06-28 19:12:09