A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 5, Issue 1
Abstract
A honeypot is a widely used security control to capture and analyse malicious network traffic. The main goal of honeypot is to monitor and receive log data, which can later be used to prevent future attacks. It imitates the contact between emulated computer and attacker with the objective of acquiring sufficient data for effective analysis and potential prevention of attacks. A honeypot is used to detect intruders in many fields such as defence, Government sectors, enterprises, higher institutions, Banking sectors, Nuclear reactors and many more. There are two types of honeypots that are deployed for different uses research honeypots and production honeypots. Research honeypots are focused on gathering information about the attack, used specifically for the purpose of learning about hacking methodologies. Production honeypots, on the other hand, are focused primarily on diverting attacks from important systems. This work detects the type of the intruders, analyses their strategy and strength of the attack. The deployment of honeypot detects various kinds of attacks using different sensors. Server is deployed in the cloud environment and sensors can be deployed in either in cloud or in Raspberry pi or machine. Server displays the feeds from sensors which is placed over different locations. Live rendering of attacks is shown in the dashboard and honey map points the exact geographic locations using longitude and latitude values. These logs can be further used to analyses and take essential measures in defence perspectives. Anil Tom | Dr. M N Nachappa "A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35900.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35900/a-study-on-honeypots-and-deceiving-attacker-using-modern-honeypot-network/anil-tom
Authors and Affiliations
Anil Tom | Dr. M N Nachappa
Decolorization of Textile Dye- Malachite Green
The microbial decolorization of dyes has been of considerable interest biological treatment of the wastewater containing dyes. The bacterial isolate, Bacillus sp. was isolated from the textile effluent sample. Different...
An Autonomous UAV for Pesticide Spraying
The use of pesticides in agriculture is essential to maintain the quality of large scale production. The spraying of these products by using aircraft speeds up the process and prevents compacting of the soil. However, ad...
Experimental Analysis on Strength Properties of Glass Fiber Concrete
The current world is witnessing the construction of challenging and innovative civil engineering structures. It has been established that when fibers are added in certain percentage to the concrete improves the strength...
Anita Nair's "Ladies Coupe" The Patriarchal Set Up of the Indian Family Life
The paper showcases the theme of the patriarchal set up of the Indian family life in Anita Nair's “Ladies Coupeâ€. Anita Nair's “Ladies Coupe†is a great success in literature world.As a woman writer, she goes dee...
Monitoring and Evaluating the Contribution of the Rural Development in India and Master Plan for Development of MULHER Village
The rural development generally refers to the process of improving guarantee of life and economic welfare of people living in relatively isolated and sparsely polluted in India, out of total population of 131 crores, 83....