Security of network becomes primary importance of every organization to protect it from any kind of cyber attack. For this, the analysis of traffic that travels in the network is an imperative task. Traffic analysis on network is done by installing various network intrusion detection (NID) devices. One of a very vital device for detecting network intrusions is a Honeypot. Honeypots interact with the attacker and collect the data which can be analyzed to retrieve information regarding the attacks and attacker in the network. Honeypots are security resources that are targeted by the attacker and generate data logs of the attacks. Honeypots provide relevant data in a small quantity so that security researchers could easily understand and the analysis of the data becomes feasible. In this paper honeypot is simulated to interact with attackers and the data collected by using honeypot is analyzed using various tools.
Gurdip KaurMeenu KhuranaMonika Sethi
Florin MocanuLuminița Scripcariu
Mohd Faris Mohd FuziMuhammad Fahimuddin MazlanMuhammad Nabil Fikri JamaluddinIman Hazwam Abd Halim