International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 22 |
Year of Publication: 2020 |
Authors: Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan |
10.5120/ijca2020920238 |
Adnaan Arbaaz Ahmed, Vanam Rajkumar, M. I. Thariq Hussan . Honeypots: Screening Cyber Attacks. International Journal of Computer Applications. 176, 22 ( May 2020), 53-58. DOI=10.5120/ijca2020920238
Cyber attacks have been a part of modern human combat. Various technologies like Intrusion detection system (IDS), Intrusion Prevention system (IPS), firewalls are under active monitoring to generate alerts and in preventing cyber-attacks. However, these mechanisms are not the solutions as they cannot generate accurate solutions, potentially Intrusion detection system tend to generate false signals. Perhaps, cyber attacks cannot be just controlled with just tools. Instead it requires an Indicator of compromise (IoC) which is an important subject in IT sector to identify true positive attacks. In this paper, it is proposed a new threat intelligence technique which evaluates by analysing honeypot’s log data to identify true cyber attacks and to immediately act anincident response process. This goal is achieved by deploying a honeypot on an AWS cloud to gather cyber-attacks. This method of malware bypasses technical solutions by leveraging social engineering methods in order to prevent ransomware attacks. An additional system for perimeter defence is established. Honeypots are spurious computer resources deployed by network administrator to act as decoy computers and identify any informal access. Investigations determined a suitable method to identify changes to this aspect. Two options were filed under research, one is the file screening service of the Microsoft File Server Resource Manager feature and the other is Event Sentry to manipulate the Windows Security logs. Under development process, a determined response to attacks to the system along with threshold were initiated. The research also mentioned that witness to tripwire files offered limited value as there is no alternative to influence the malware to access monitored files.