CFP last date
20 January 2025
Reseach Article

Honeypots: Screening Cyber Attacks

by Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 22
Year of Publication: 2020
Authors: Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan
10.5120/ijca2020920238

Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan . Honeypots: Screening Cyber Attacks. International Journal of Computer Applications. 176, 22 ( May 2020), 53-58. DOI=10.5120/ijca2020920238

@article{ 10.5120/ijca2020920238,
author = { Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan },
title = { Honeypots: Screening Cyber Attacks },
journal = { International Journal of Computer Applications },
issue_date = { May 2020 },
volume = { 176 },
number = { 22 },
month = { May },
year = { 2020 },
issn = { 0975-8887 },
pages = { 53-58 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number22/31335-2020920238/ },
doi = { 10.5120/ijca2020920238 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:43:15.599701+05:30
%A Adnaan Arbaaz Ahmed
%A Vanam Rajkumar
%A M. I. Thariq Hussan
%T Honeypots: Screening Cyber Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 22
%P 53-58
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyber attacks have been a part of modern human combat. Various technologies like Intrusion detection system (IDS), Intrusion Prevention system (IPS), firewalls are under active monitoring to generate alerts and in preventing cyber-attacks. However, these mechanisms are not the solutions as they cannot generate accurate solutions, potentially Intrusion detection system tend to generate false signals. Perhaps, cyber attacks cannot be just controlled with just tools. Instead it requires an Indicator of compromise (IoC) which is an important subject in IT sector to identify true positive attacks. In this paper, it is proposed a new threat intelligence technique which evaluates by analysing honeypot’s log data to identify true cyber attacks and to immediately act anincident response process. This goal is achieved by deploying a honeypot on an AWS cloud to gather cyber-attacks. This method of malware bypasses technical solutions by leveraging social engineering methods in order to prevent ransomware attacks. An additional system for perimeter defence is established. Honeypots are spurious computer resources deployed by network administrator to act as decoy computers and identify any informal access. Investigations determined a suitable method to identify changes to this aspect. Two options were filed under research, one is the file screening service of the Microsoft File Server Resource Manager feature and the other is Event Sentry to manipulate the Windows Security logs. Under development process, a determined response to attacks to the system along with threshold were initiated. The research also mentioned that witness to tripwire files offered limited value as there is no alternative to influence the malware to access monitored files.

References
  1. AdnaanArbaaz Ahmed, Dr. M.I. ThariqHussan, “Cloud Computing: Study of Security Issues and Research Challenges”, International Journal for Advanced Research in Computer Engineering and Technology Volume 7, Issue 4, 362-369, April 2018.
  2. AdnaanArbaaz Ahmed, Durganath Rajesh, Dr. M.I. ThariqHussan, “Implementing Machine Learning Techniques in Malware Detection”, International Journal for Research in Engineering Application and Management Volume 4, Issue 9, 155-158, December 2018.
  3. AdnaanArbaaz Ahmed, Dr. M.I. ThariqHussan, VenkateswarluBollapalli,“Upgrade- Data Security in Cloud by Machine Learning and Cryptography Techniques”, International Journal of Engineering and Advanced Technology Volume 8, Issue 6, 2728-2732, August 2019.
  4. Navneet Kambow , Lavleen Kaur Passi, “Honeypots: The Need of Network Security” International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6098-6101
  5. Pavol Sakol, Jakub Misek, Martin Husak, “Honeypots and honeynets: issues of privacy” EURASIP Journal on Information Security, February 2017
  6. AUTHORS PROFILE
  7. Adnaan Arbaaz Ahmed popularly known as Technophyle Ahmed is a tech junkie and a self proclaimed offensive and defensive ethical hacker and security expert of computer systems. He is specialized in Networking, Cloud Computing, Linux, Java, Python, Ethical Hacking, Cyber Security, Machine Learning, Artificial Intelligence, DevOps, Data Science, Containers Technology, Blockchain, etc. He is the director of Techionary. He delivered almost a 50 workshops on the above listed domains igniting young min
  8. Vanam Rajkumar, is the Chief of Executive of Techionary. Speaker for Institute for Engineering research and Artificial Intelligence (IERAI-2020) for the topic “AI assisted chatbot for visually impaired and disabled persons” . Member of International Association of Engineers society of Artificial Intelligence (IAENG). Project fellow at Foundation for Advancements In Engineering and Research (FAER-2019) for the proposal titled “Detection of harmful gas to ensure safety and security of human life a
  9. Dr. M.I.Thariq Hussan has 18 International and 1 National journal publications. He has presented papers in 31 International/National conferences and attended 36 Seminars/Workshops/FDP/QIP. He has published 2 books titled ‘System Analysis and Design’ and ‘Operating Systems’. He has received ‘Innovative Technological Research (Communication) and Dedicated Professor Award’ from Innovative Scientific Research Professional Malaysia (India Chapter). He also received ‘Best Teacher Award-2018’ from Inst
Index Terms

Computer Science
Information Sciences

Keywords

AdbHoney Amun Artilliary AWS CiscoASA Cowrie Conpot Cyber Attacks Cyber Security Dianaea EC2 Elastic Pot Elastic Search Glastopf Glutton Heralding Honeypie Honeypots Honeytrap Kibana Kippo LogStash Mailoney P0f Engineering tool Port Forwarding Port Numbers Rpdy Security Server logs Snare Tanner