Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Honey-patterns: Recognizing Pattern based Attacks on Websites

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Prathamesh P. Churi, Shreya Bondre, Neha Gavankar

Prathamesh P Churi, Shreya Bondre and Neha Gavankar. Honey-patterns: Recognizing Pattern based Attacks on Websites. International Journal of Computer Applications 161(9):8-11, March 2017. BibTeX

	author = {Prathamesh P. Churi and Shreya Bondre and Neha Gavankar},
	title = {Honey-patterns: Recognizing Pattern based Attacks on Websites},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {9},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {8-11},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017913202},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in networks to study the trail of hackers and to alert network administrators of a possible intrusion. Honey net is a method for detection of abnormal activity in the network. Honey net is an additional layer of security. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Data Capture and Data Control are properties of honeyed, used extensively by the research community to study issues in network security, such as Internet worms, Spam control, DoS attacks, etc. In this paper, we will be focusing on the attack part.


  1. Honey net Projects. Website : Last Accessed : 3rd Feb 2017
  2. Spitzner, L. Honey-pots Tracking Hackers, MA: Addison-Wesley, 2002
  3. Sams. Teach Yourself My-SQL in 21 Days
  4. Software Engineering by TATA mc-graw hill publications
  5. Learning PHP and MySQL by O’REILLY publications
  6. For tracking Honey-pots and related information ,


Security, tools, installation problem, framework, designing, projects, Web application