International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 184 - Number 50 |
Year of Publication: 2023 |
Authors: Waqas Ahmad, Muhammad Arsalan Raza, Sabreena Nawaz, Farhana Waqas |
10.5120/ijca2023922624 |
Waqas Ahmad, Muhammad Arsalan Raza, Sabreena Nawaz, Farhana Waqas . Detection and Analysis of Active Attacks using Honeypot. International Journal of Computer Applications. 184, 50 ( Mar 2023), 27-31. DOI=10.5120/ijca2023922624
Honeypots are computer systems specifically deployed to deceive attackers so that they consider them legitimate computers. Honeypots are actually a trap to trick the attackers so that we can learn about their behavior and the attack methods they use. Security experts collect all the relevant information about attack techniques and behavior and take firm actions to strengthen security measures. Although another technique is also being used which is Intrusion Detection and Prevention System (IDPS), but it generates false positives and false negatives, which is a limitation of IDPS. Therefore, to know the behavior, methods, techniques, and signatures of an attacker, the Dionaea honeypot system is used to collect the information regarding cyber-attacks, proving it a more useful way rather than previous traditional methods. Attacks that were captured by the honeypot software reveal the source IP addresses of the attackers and the target host which became the victim of attacks.