CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Honeypot- A Tool to Trap Website Hackers

Published on February 2013 by Juhi Danani, Jinal Jani
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 11
February 2013
Authors: Juhi Danani, Jinal Jani
b6cf1cd2-dfb0-4cfd-943e-67daecd123b6

Juhi Danani, Jinal Jani . Honeypot- A Tool to Trap Website Hackers. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 11 (February 2013), 8-13.

@article{
author = { Juhi Danani, Jinal Jani },
title = { Honeypot- A Tool to Trap Website Hackers },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 11 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 8-13 },
numpages = 6,
url = { /proceedings/icrtitcs2012/number11/10411-1331/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Juhi Danani
%A Jinal Jani
%T Honeypot- A Tool to Trap Website Hackers
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 11
%P 8-13
%D 2013
%I International Journal of Computer Applications
Abstract

Honeypot is a closely monitored decoy that is employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Honeynet is a methods for detection/protection/defense. Honeynet is an additional layer of security. Using Honeypot provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Data Capture and Data Control are the properties of honeynet. Nowadays, they are also being extensively used by the research community to study issues in network security, such as Internet worms, spam control, DoS attacks, etc. In this paper, we advocate the use of honeypots as an effective educational tool to study issues in network security. We support this claim by demonstrating a set of projects that we have carried out in a Websites, which we have deployed specifically for running various web applications' under supervision . Primary intent of honeypot is to log and capture effects and activities of the threat.

References
  1. Lance Spitzner. Honeypots: Tracking Hackers. Addison-Wesley, Boston. 2002.
  2. Cli®ord Stoll. Stalking the Wily Hacker. Communications of the ACM. pp 484-
  3. Honeynet Research Alliance. Project Honeynet Website. Retrieved May 16th
  4. Computer Emergency Response Team. dtscpd Exploit Advisory. Ad-
  5. Niels Provos. Honeyd. Retrieved May 16th 2003 from the World Wide
  6. http://www. citi. umich. edu/u/provos/honeyd/
  7. Dug Song and Niels Provos. Arpd. Retrieved May 16th 2003 from the World
  8. Wide http://www. citi. umich. edu/u/provos/honeyd/
  9. Net¯lter Core Team. ptables. Retrieved May 16th 2003 from the World Wide
  10. Web: http://www. net¯lter. org
  11. Martin Roesch. Snort. Retrieved May 17th 2003 from the World Wide Web:
  12. http://www. snort. org
  13. Honeynet Research Alliance. Honeynet Project Snort con¯gura-tion ¯le. Retrieved May 17th 2003 from the World Wide Web:
  14. http://www. honeynet. org/papers/honeynet/tools/snort. conf.
  15. Lance Spitzner Honeypots: Tracking Hackers September 10, 2002 Addison-Wesley Professional
  16. James O'Toole / Pittsburgh Post-Gazette Specter revises early attack ad against possible rival Toomey April 4, 2009
  17. Niels Provos, Thorsten Holz Virtual Honeypots: From Botnet Tracking to Intrusion Detection. July 16, 2007
  18. TANUSHA A Firefox Extension for Detecting Stored Cross Site Scripting Attack MARCH 23, 2011
  19. Stuart McDonald SQL Injection: Modes of Attack, Defence, and Why it matters April 8, 2002
  20. Lance Spitzner Honeytokens: The Other Honeypot 17 July, 2003
  21. Sainath Patil Nageshri B Karhade Honeyweb: a web-based high interaction client honeypot -30 Mar'12
  22. L. Spitzner, (2002). Honeypots: Tracking Hackers. 1st edition. Addison-Wesley Professiona. ISBN-10: 0321108957.
  23. Lance Spitzner. Honeypots: Catching the insider threat. In ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference, page 170, Washington, DC, USA,2003. IEEE Computer Society.
  24. Fabien Pouget and Marc Dacier. Honeypot-based forensics. In AusCERT Asia Pacific Information technology Security Conference 2004, Brisbane, Australia, May 2004.
  25. BRUCE PERENS ,PHP 5 Power Programming y, September 23,
Index Terms

Computer Science
Information Sciences

Keywords

Security Tools Installation Problem Framework Designing Projects Web Application