Model
Model
SHRUTHIKA S / IV CS
SIBHI CHAKRAVARTHI B / IV CS
VIGNESH N K / IV CS
Batch No: CS2024001
Name of the Mentor : Ms.S.POORANI
SCREENSHOTS
CONTENTS
INTRODUCTION
ABSTRACT
TO PROBLEM DOMAIN
•In today's digital age, cybersecurity threats are ever-present, with malicious
actors constantly seeking to exploit vulnerabilities in network systems.
•One effective approach to monitoring and detecting unauthorized access
attempts is the deployment of SSH honeypots.
•These decoy servers legitimate SSH services to attract and monitor malicious
activities.
•This project explores the implementation and effectiveness of SSH honeypots
in enhancing cybersecurity by capturing and analyzing malicious SSH
interactions.
SSH (Secure Shell) is a widely used protocol for secure remote access to
systems, providing encryption and authentication mechanisms to protect
communication over networks.
•However, SSH services are also prime targets for attackers seeking to gain
unauthorized access to servers and exploit sensitive information
LITERATURE
LITERATURE SURVEY
OBJECTIVES
ABSTRACT
REVIEW
1.
2.
3.
REFERENCES
REFERENCES
PROPOSED WORK : ARCHITECTURE DIAGRAM
ABSTRACT
REFERENCES
REFERENCES
SCREENSHOTS
MODULES
RESEARCH
ABSTRACT
CHALLENGES
1. Data Acquisition:
• This module would be responsible for collecting the data HoneyScanner needs to
function.
• Potential functionalities include:
• Scanning for honeytokens (fake access credentials) placed by security
researchers.
• Scraping data from websites or online sources .
• Interacting with APIs to retrieve relevant information
2. Data Analysis:
• This module would process the collected data to identify potential security threats.
• Potential functionalities include:
• Analyzing the structure and format of honeytokens.
• Identifying patterns or indicators of malicious activity.
• Extracting useful insights from the scraped data .
REFERENCES
REFERENCES
SCREENSHOTS
MODULES
RESEARCH
ABSTRACT
CHALLENGES
[3] Hironori Uchibori, Katsunari Yoshioka and Kazumasa Omote, “Honeypot Method to Lure
Attackers without Holding Crypto-Assets” , Blockchain, vol. 11, pp. 2-4, 2023.
[4] L. Zobal, D. Kolar, and R. Fujdiak, “Current state of honeypots and deception strategies in
cybersecurity,” in 2019 11th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT), pp. 1–9, 2023.
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[5] B. Rashidi, C. Fung, K. W. Hamlen, and A. Kamisinski, “Honeyv: A virtualized honeynet
system based on network softwarization,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations
and Management Symposium, pp. 1–5, 2018.
[6] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data" in IEEE Transactions on Parallel and Distributed Systems,
vol. 27, no. 2, pp. 9-21, 2016.
[7] M. S. Ali and M. S. Hossain, "Evaluation of Cowrie SSH/Telnet Honeypot in Detecting and
Monitoring Cyber Attacks," in IEEE Access, vol. 8, pp. 8780-8790, 2020.
[8] L. Shi, Y. Li, T. Liu, J. Liu, B. Shan, and H. Chen, “Dynamic Distributed Honeypot Based on
Blockchain,” IEEE Access, vol. 7, pp. 34–46, 2019.