A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network

Abstract

A honeypot is a widely used security control to capture and analyse malicious network traffic. The main goal of honeypot is to monitor and receive log data, which can later be used to prevent future attacks. It imitates the contact between emulated computer and attacker with the objective of acquiring sufficient data for effective analysis and potential prevention of attacks. A honeypot is used to detect intruders in many fields such as defence, Government sectors, enterprises, higher institutions, Banking sectors, Nuclear reactors and many more. There are two types of honeypots that are deployed for different uses research honeypots and production honeypots. Research honeypots are focused on gathering information about the attack, used specifically for the purpose of learning about hacking methodologies. Production honeypots, on the other hand, are focused primarily on diverting attacks from important systems. This work detects the type of the intruders, analyses their strategy and strength of the attack. The deployment of honeypot detects various kinds of attacks using different sensors. Server is deployed in the cloud environment and sensors can be deployed in either in cloud or in Raspberry pi or machine. Server displays the feeds from sensors which is placed over different locations. Live rendering of attacks is shown in the dashboard and honey map points the exact geographic locations using longitude and latitude values. These logs can be further used to analyses and take essential measures in defence perspectives. Anil Tom | Dr. M N Nachappa "A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35900.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35900/a-study-on-honeypots-and-deceiving-attacker-using-modern-honeypot-network/anil-tom

Authors and Affiliations

Anil Tom | Dr. M N Nachappa

Keywords

Related Articles

A Reflection on the Procedure for the Arrest of a Vessel Under the CEMAC Marine Merchant Code 2012 within Cameroons Territorial Waters and Post Arrest Issues

As a littoral State with a long coastlines and a huge interest in the Atlantic ocean Cameroon has the responsibility to dispense justice with regard to matters pertaining to the waters under her control. Ship arrest with...

Obstacle Identification on Railway Tracks

We propose a method for detecting obstacles by comparing input and reference train frontal view camera images. In the field of obstacle detection, most methods employ a machine learning approach, so they can only detect...

An Appraisal of The Effect of Visual Discrimination Training in the Recognition of Pictures on Reading Among Struggling Readers in Primary Schools in Buea Municipality Cameroon

The realisation of the full potentials of all learners has been and is the utmost concern of Special Education and Educators. This study was out to carry out an appraisal of the effect of visual discrimination training i...

Application of First Order Linear Equation Market Balance

If we consider economic variables as a continuous function of time, then we will encounter with relations which we have to use differential equations to solve them. If we consider the collection of relations of economic...

Comparison of Gauss Jacobi Method and Gauss Seidel Method using Scilab

Numerical Method is the important aspects in solving real world problems that are related to Mathematics, science, medicine, business etc. In this paper, We comparing the two methods by using the scilab 6.0.2 software co...

Download PDF file
  • EP ID EP692189
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Anil Tom (2020). A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network. International Journal of Trend in Scientific Research and Development, 5(1), -. https://europub.co.uk/articles/-A-692189