CFP last date
20 May 2024
Reseach Article

Analysis of Network Intrusion Attacks using Honeypots

by N. Ramakrishnaiah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 32
Year of Publication: 2018
Authors: N. Ramakrishnaiah
10.5120/ijca2018918255

N. Ramakrishnaiah . Analysis of Network Intrusion Attacks using Honeypots. International Journal of Computer Applications. 182, 32 ( Dec 2018), 33-37. DOI=10.5120/ijca2018918255

@article{ 10.5120/ijca2018918255,
author = { N. Ramakrishnaiah },
title = { Analysis of Network Intrusion Attacks using Honeypots },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 182 },
number = { 32 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number32/30237-2018918255/ },
doi = { 10.5120/ijca2018918255 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:07.504337+05:30
%A N. Ramakrishnaiah
%T Analysis of Network Intrusion Attacks using Honeypots
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 32
%P 33-37
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network intrusion attacks are performed quite immensely these days. Malicious intruder performs attacks on the infrastructure of a network of organizations. The increase in the number of various intruders and different attacks has made mitigation and security implementation a hard task to be achieved. In order to accomplish felonious access over server, attackers target Secure Shell service. In this paper, an intrusion detection operation and web trap for an intruder is performed on SSH service. A fake file system is created which will camouflage itself as the original root. A honeypot system which remains an effective environment in gathering intelligence about the intruder is used and information which is highly sufficient in the identification of the attacker is collected. In this, the honeypot is used to by-port the main SSH port and run the fake file system of the honeypot in the main port to mislead and trap the details of the intruder. By the end of the process, reports and play logs will be generated on the performed attacks which would be useful for further research phase. Visualization tools would further help in the analysis of the activity of the attacker.

References
  1. S. A. Budiman, C. Iswahyudi, and M. Sholeh, 2014, “Implementasi Intrusion Detection System (IDS) Menggunakan Jejaring Sosial Sebagai Media Notifikasi,”in Prosiding Seminar Nasional Aplikasi Sains & Teknologi (SNAST).
  2. Thomas H. Ptacek, 2002, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.
  3. http://secinf.net/info/ids/idspaper/idspaper.html
  4. Gokul Kannan Sadasivam, Chittaranjan Hota, 2015, ” Scalable Honeypot Architecture for Identifying Malicious Network Activities”, International Conference on Emerging Information Technology and Engineering Solutions.
  5. Honeynet Project., 18 January, 2003, Know Your Enemy: Passive Honeynets. http://project.honeynet.org/
  6. Honeynet Project. 24 May 2000, Know Your Enemy: Passive Fingerprinting.. http://project.honeynet.org/
  7. Kippo-Graph [Online] Available: https://bruteforcelab.com/
  8. J. Owens and J. Matthews, 2008, “A Study of Passwords and Methods Used in Brute-Force SSH Attacks.”
  9. “phpMyAdmin.” [Online]. Available:
  10. http://www.phpmyadmin.net/home_page/index.php
  11. Janardhan Reddy Kondra, Sambit Kumar Mishra, Santosh Kumar Mishra, Korra Satya Babu, 2016, “Honeypot-Base Intrusion Detection System:A performance Analysis”, 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
  12. Zhang Li-juan, 2009, ”Honeypot-based Defense System Research and Design”, IEEE International Conference on Computer Science and Information Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection SSH attack analysis intrude honeypot brute-force.