CFP last date
22 April 2024
Reseach Article

Honey-patterns: Recognizing Pattern based Attacks on Websites

by Prathamesh P. Churi, Shreya Bondre, Neha Gavankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 9
Year of Publication: 2017
Authors: Prathamesh P. Churi, Shreya Bondre, Neha Gavankar
10.5120/ijca2017913202

Prathamesh P. Churi, Shreya Bondre, Neha Gavankar . Honey-patterns: Recognizing Pattern based Attacks on Websites. International Journal of Computer Applications. 161, 9 ( Mar 2017), 8-11. DOI=10.5120/ijca2017913202

@article{ 10.5120/ijca2017913202,
author = { Prathamesh P. Churi, Shreya Bondre, Neha Gavankar },
title = { Honey-patterns: Recognizing Pattern based Attacks on Websites },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 9 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number9/27174-2017913202/ },
doi = { 10.5120/ijca2017913202 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:57.933157+05:30
%A Prathamesh P. Churi
%A Shreya Bondre
%A Neha Gavankar
%T Honey-patterns: Recognizing Pattern based Attacks on Websites
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 9
%P 8-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in networks to study the trail of hackers and to alert network administrators of a possible intrusion. Honey net is a method for detection of abnormal activity in the network. Honey net is an additional layer of security. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Data Capture and Data Control are properties of honeyed, used extensively by the research community to study issues in network security, such as Internet worms, Spam control, DoS attacks, etc. In this paper, we will be focusing on the attack part.

References
  1. Honey net Projects. Website : http://www.honeynet.org/ Last Accessed : 3rd Feb 2017
  2. Spitzner, L. Honey-pots Tracking Hackers, MA: Addison-Wesley, 2002
  3. Sams. Teach Yourself My-SQL in 21 Days
  4. Software Engineering by TATA mc-graw hill publications
  5. Learning PHP and MySQL by O’REILLY publications
  6. For tracking Honey-pots and related information , http://www.tracking-hackers.com
Index Terms

Computer Science
Information Sciences

Keywords

Security tools installation problem framework designing projects Web application