High Impact Factor : 4.396 icon | Submit Manuscript Online icon | UGC Approved icon

Honeypot : A Tool to Research Cyber Attack Techniques

Author(s):

Ramkumar Gupta , Atharva College of Engineering, Malad(W).; Kaiz Jessani, Atharva College of Engineering, Malad(W).; Manasiya Safan, Atharva College of Engineering, Malad(W).; Shweta Sharma, Atharva College of Engineering, Malad(W).

Keywords:

Cyber Attack, DOS attack, DDOS attack

Abstract

The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This paper aims to uncover some of these threats and reveal just how vulnerable the internet can be. The use of internet increases in daily life rapidly. Due to which many system run online such as payment system for online transactions, e - commerce system etc. Therefore there are some threat to these system . These are increasing in number very rapidly . The top five vulnerabilities are : 1) SSL/TLS Poodle Vulnerability 2) Cross-Site Scripting 3) SSL v2 support detected 4) SSL Weak Cipher Suites Supported 5) Invalid SSL certificate chain There are various other vulnerabilities such as IP spoofing , SQL injection , DOS attack , DDOS attack. In the field of computer security, honeypots are systems aimed at deceiving malicious users who launch attacks against the servers and network infrastructure of various organizations. They can be deployed as protection mechanisms to an organization's real systems, or as research units to study and analyze the methods employed by individual hackers In this paper we will later present the results of a research honeypot's operation, which undertook the role of a web trap for attackers who target the SSH service in order to gain illegal server access Lastly we will present a visualization tool aimed at helping security researchers during the analysis and conclusions drawing phases, for use with the same SSH honeypot implementation software as outlined in this work

Other Details

Paper ID: NCTAAP131
Published in: Conference 4 : NCTAA 2016
Publication Date: 29/02/2016
Page(s): 563-567

Article Preview




Download Article