![]() ![]() If designed and deployed correctly, a honey-pot can function as an advance surveillance tool and well as a threat intelligence collection mechanism. Our system is tested by visiting of various malicious websites and detection of malwares dropped on the system is detected and logged in the system database.Ī honey-pot is a deception toolkit, designed to hook an attacker attempting to compromise the production systems of any institute or organization. This system incorporates multi level detection by using vulnerabilities based attack data collection and network intrusion detection based attack data collection. The ultimate goal of Attack Data Collection system is to detect and identify any malicious activity coming from the Internet. Special techniques were implemented in order to enhance the data capture mechanisms on the Linux-based Honeypot to efficiently generate reports. An effort has been made to ensure that all the software (both the OS and associated tools) used for the project are either free or Open Source. ![]() The implementation is specific to a Linux based host having a single physical network interface card. This paper proposes a methodology for establishing a virtual Honeypot on a Virtualbox Server running dionaea. A honeypot is a type of information system that is used to obtain information on intruders in a network. Nowadays, security system is very important to any organization to protect their data or any information kept in their computer from the intruders to access. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |