A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 5, Issue 1
Abstract
A honeypot is a widely used security control to capture and analyse malicious network traffic. The main goal of honeypot is to monitor and receive log data, which can later be used to prevent future attacks. It imitates the contact between emulated computer and attacker with the objective of acquiring sufficient data for effective analysis and potential prevention of attacks. A honeypot is used to detect intruders in many fields such as defence, Government sectors, enterprises, higher institutions, Banking sectors, Nuclear reactors and many more. There are two types of honeypots that are deployed for different uses research honeypots and production honeypots. Research honeypots are focused on gathering information about the attack, used specifically for the purpose of learning about hacking methodologies. Production honeypots, on the other hand, are focused primarily on diverting attacks from important systems. This work detects the type of the intruders, analyses their strategy and strength of the attack. The deployment of honeypot detects various kinds of attacks using different sensors. Server is deployed in the cloud environment and sensors can be deployed in either in cloud or in Raspberry pi or machine. Server displays the feeds from sensors which is placed over different locations. Live rendering of attacks is shown in the dashboard and honey map points the exact geographic locations using longitude and latitude values. These logs can be further used to analyses and take essential measures in defence perspectives. Anil Tom | Dr. M N Nachappa "A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35900.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/35900/a-study-on-honeypots-and-deceiving-attacker-using-modern-honeypot-network/anil-tom
Authors and Affiliations
Anil Tom | Dr. M N Nachappa
A Reflection on the Procedure for the Arrest of a Vessel Under the CEMAC Marine Merchant Code 2012 within Cameroons Territorial Waters and Post Arrest Issues
As a littoral State with a long coastlines and a huge interest in the Atlantic ocean Cameroon has the responsibility to dispense justice with regard to matters pertaining to the waters under her control. Ship arrest with...
Obstacle Identification on Railway Tracks
We propose a method for detecting obstacles by comparing input and reference train frontal view camera images. In the field of obstacle detection, most methods employ a machine learning approach, so they can only detect...
An Appraisal of The Effect of Visual Discrimination Training in the Recognition of Pictures on Reading Among Struggling Readers in Primary Schools in Buea Municipality Cameroon
The realisation of the full potentials of all learners has been and is the utmost concern of Special Education and Educators. This study was out to carry out an appraisal of the effect of visual discrimination training i...
Application of First Order Linear Equation Market Balance
If we consider economic variables as a continuous function of time, then we will encounter with relations which we have to use differential equations to solve them. If we consider the collection of relations of economic...
Comparison of Gauss Jacobi Method and Gauss Seidel Method using Scilab
Numerical Method is the important aspects in solving real world problems that are related to Mathematics, science, medicine, business etc. In this paper, We comparing the two methods by using the scilab 6.0.2 software co...