Network Security Using Honeypot and Attack Detection with Android Application
DOI:
https://doi.org/10.11594/10.11594/ijer.02.02.04Keywords:
honeypot, intrusion, DDOS, brute forceAbstract
Network security is now increasingly needed in the era of the industrial revolution 4.0. As technology grows, cybercrimes are becoming more and more common, including attacks on a resource. At this time, honeypots are also widely used by large industries for network security, besides that honeypots are also useful for them in developing intrusion and preventing systems. Honeypots are usually used in a virtual environment, they will stimulate a fake system to capture data packets on the network and be analysed offline later for all threats and attacks.
This propose of this paper is to detect and prevent building attacks from computer network attackers using an android application. This application can monitor an attack on the server by installing a honeypot tool into the server as an attack detector, then the honeypot log is used as a Rest API using Django framework with MongoDB database. this application can find out if there is an attack on the server, and can block the attacker's IP address.
Downloads
References
A. Jain, Dr. BalaBush (2015) “Advaces Trend in Network Security With Honeypot and its Compare Study With Othe Techniques”, R.N. Modi Engineering College, Kota, Rajasthan, India, (IJETT), Vol. 29, No. 26, Nov
B. Adam, A. Todd (2016) “What’s in Your Honeypot”, International Conferrence on Cyber Warfare and Security, 355-IX
J. Kumar Jain, S. Surabi (2012) “Honeypot Base Secure Network System”, Computer Science & Engineering Samrat Ashok Technological Institute Vidisha, MP, India, (IJCSE),-Volume 3 – no 2, Feb
K. Rutu (2011) “Honeypot With Honeypot Management System for Web Application”, California State University, Long Beach, Proquest Dissertation Publishing
K. Shubham, (2019) “Securing Network Trough Honeypot and its Implementation”, International Journal of Advanced Research in Computer Sience, Vol 10, No. 5, Sept-Okt
DOI:http://dx.doi.org/10.26483/ijarcs.v10i5.6478
Lakhsmi S. Deepa, G. Arunkumar, V. Madhu (2015) “Network Security Enhancement through Honey-pot based Systems”, International Journal of Engi-neering and Technology (IJET), Vol 7, No 1, Mar, ISSN: 0975-4024
M. Solomon Z, P.S. Avadhani (2016) “Honeypot System for Attacks on SSH Protocol”, I.J. Computer Network and Information Security, Sept
P. Sheilly, G. Sonali, Apoorva, Lotfy, K. Amandeep, (2016) “Honeypot : A Security Tool in Intrution Detection”, International Journal of Advanced Engineering, Management and Science (IJAEMS), Vol 2, Issue 5, May , ISSN: 2454-1311.
R. Rajbhar (2018) “Intrusion Detection & Prevention Using Honeypot”, International Journal of Advanced Research in Computer Sience, vol 9, No. 4, July
DOI: http://dx.doi.org/10.26483/ijarcs.v9i4.6176
S. Pavol, M. Jakub, H. Martin (2017) “Honeypots and Honeynets : Issues of Privacy”, EURASIP Journal on Information Security, April , DOI 10.1186/s13635-017-0057-4
Vladimir B. Oliviera, A. Zair, L. Denivaldo, Mario H. Santos, Valeria P. Fernandes (2013) “HONEYPOTLABSAC: A Virtual Honeypot Framework For Android”, International Journal of Computer Network and Communication (IJCNC), vol.5, No.5, July .
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See the Effect of Open Access).