JOURNAL ARTICLE

Analysis of Network Intrusion Attacks using Honeypots

N. Ramakrishnaiah

Year: 2018 Journal:   International Journal of Computer Applications Vol: 182 (32)Pages: 33-37

Abstract

Network intrusion attacks are performed quite immensely these days.Malicious intruder performs attacks on the infrastructure of a network of organizations.The increase in the number of various intruders and different attacks has made mitigation and security implementation a hard task to be achieved.In order to accomplish felonious access over server, attackers target Secure Shell service.In this paper, an intrusion detection operation and web trap for an intruder is performed on SSH service.A fake file system is created which will camouflage itself as the original root.A honeypot system which remains an effective environment in gathering intelligence about the intruder is used and information which is highly sufficient in the identification of the attacker is collected.In this, the honeypot is used to by-port the main SSH port and run the fake file system of the honeypot in the main port to mislead and trap the details of the intruder.By the end of the process, reports and play logs will be generated on the performed attacks which would be useful for further research phase.Visualization tools would further help in the analysis of the activity of the attacker.

Keywords:
Honeypot Computer science Intrusion detection system Intrusion Computer security Network security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
4
Refs
0.18
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Intrusion Detection Using Honeypots

Neeraj BhagatBhavna Arora

Year: 2018 Pages: 412-417
JOURNAL ARTICLE

Honeypots: Virtual Network Intrusion Monitoring System

Manmohan DagarRashmi Popli

Journal:   International Journal of Scientific Research in Network Security and Communication Year: 2018 Vol: 6 (2)Pages: 45-49
© 2026 ScienceGate Book Chapters — All rights reserved.