0% found this document useful (0 votes)
13 views10 pages

Model

Uploaded by

Nk vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

Model

Uploaded by

Nk vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

STUDENTS RESEARCH DAY 2024

MONITORING HONEYPOT AND DETECTING


CYBER ATTACK

SHRUTHIKA S / IV CS
SIBHI CHAKRAVARTHI B / IV CS
VIGNESH N K / IV CS
Batch No: CS2024001
Name of the Mentor : Ms.S.POORANI
SCREENSHOTS
CONTENTS
INTRODUCTION
ABSTRACT
TO PROBLEM DOMAIN

•In today's digital age, cybersecurity threats are ever-present, with malicious
actors constantly seeking to exploit vulnerabilities in network systems.
•One effective approach to monitoring and detecting unauthorized access
attempts is the deployment of SSH honeypots.
•These decoy servers legitimate SSH services to attract and monitor malicious
activities.
•This project explores the implementation and effectiveness of SSH honeypots
in enhancing cybersecurity by capturing and analyzing malicious SSH
interactions.
SSH (Secure Shell) is a widely used protocol for secure remote access to
systems, providing encryption and authentication mechanisms to protect
communication over networks.
•However, SSH services are also prime targets for attackers seeking to gain
unauthorized access to servers and exploit sensitive information
LITERATURE
LITERATURE SURVEY
OBJECTIVES
ABSTRACT
REVIEW

1.
2.
3.
REFERENCES
REFERENCES
PROPOSED WORK : ARCHITECTURE DIAGRAM
ABSTRACT
REFERENCES
REFERENCES
SCREENSHOTS
MODULES
RESEARCH
ABSTRACT
CHALLENGES
1. Data Acquisition:

• This module would be responsible for collecting the data HoneyScanner needs to
function.
• Potential functionalities include:
• Scanning for honeytokens (fake access credentials) placed by security
researchers.
• Scraping data from websites or online sources .
• Interacting with APIs to retrieve relevant information

2. Data Analysis:

• This module would process the collected data to identify potential security threats.
• Potential functionalities include:
• Analyzing the structure and format of honeytokens.
• Identifying patterns or indicators of malicious activity.
• Extracting useful insights from the scraped data .
REFERENCES
REFERENCES
SCREENSHOTS
MODULES
RESEARCH
ABSTRACT
CHALLENGES

3.Deployment & Reporting:

•This module would present the security assessment of cowrie honeypot.


•Potential functionalities include:
• Generating reports that detail identified threats and potential vulnerabilities.

• Reports on active and passive attacks are generated.


REFERENCES
REFERENCES
SCREENSHOTS
MODULES
RESEARCH
ABSTRACT
CHALLENGES

3.Deployment & Reporting:

•This module would present the security assessment of cowrie honeypot.


•Potential functionalities include:
• Generating reports that detail identified threats and potential vulnerabilities.
• Reports on active and passive attacks are generated.
REFERENCES
REFERENCES
SCREENSHOTS
RESULTS AND
RESEARCH DISCUSSION
ABSTRACT
CHALLENGES
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[1] Y. Shan, Y. Yao, T. Zhao, and W. Yang, "NeuPot: A Neural Network-Based Honeypot for
Detecting Cyber Threats in Industrial Control Systems," in IEEE Transactions on Industrial
Informatics, vol. 19, no. 10, pp. 1-3 , 2023.

[2] M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, and D. Mohaisen,


“Exploring the Attack Surface of Blockchain: A Comprehensive Survey,” IEEE Communications
Surveys & Tutorials, vol. 22, no. 3, pp. 1977–2008, 2020.

[3] Hironori Uchibori, Katsunari Yoshioka and Kazumasa Omote, “Honeypot Method to Lure
Attackers without Holding Crypto-Assets” , Blockchain, vol. 11, pp. 2-4, 2023.

[4] L. Zobal, D. Kolar, and R. Fujdiak, “Current state of honeypots and deception strategies in
cybersecurity,” in 2019 11th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT), pp. 1–9, 2023.
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[5] B. Rashidi, C. Fung, K. W. Hamlen, and A. Kamisinski, “Honeyv: A virtualized honeynet
system based on network softwarization,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations
and Management Symposium, pp. 1–5, 2018.

[6] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data" in IEEE Transactions on Parallel and Distributed Systems,
vol. 27, no. 2, pp. 9-21, 2016.

[7] M. S. Ali and M. S. Hossain, "Evaluation of Cowrie SSH/Telnet Honeypot in Detecting and
Monitoring Cyber Attacks," in IEEE Access, vol. 8, pp. 8780-8790, 2020.

[8] L. Shi, Y. Li, T. Liu, J. Liu, B. Shan, and H. Chen, “Dynamic Distributed Honeypot Based on
Blockchain,” IEEE Access, vol. 7, pp. 34–46, 2019.

You might also like