Cyber Honeypot

Authors

  • Mrs. M. Sandhya Rani Assistant Professor, Department of Computer Science and Engineering, Anurag University, Hyderabad, Telangana, India Author
  • Guda Ankitha Department of Computer Science and Engineering, Anurag University, Hyderabad, Telangana, India Author
  • Polasani Harini Department of Computer Science and Engineering, Anurag University, Hyderabad, Telangana, India Author
  • G Ravi Department of Computer Science and Engineering, Anurag University, Hyderabad, Telangana, India Author

DOI:

https://doi.org/10.32628/IJSRST52411168

Keywords:

Cyber Threats, Honeypot, IP Address Tracking, Security, Canary Tokens

Abstract

In an era of escalating cyber threats, the need for robust defenses against malicious activities is paramount. In this project, we propose a novel approach to leverage honeypots in conju nction with Canary Tokens to accurately pinpoint the geographical locations of attackers. By strategically deploying these decoy resources across diverse network environments, we capture valuable data on unauthorized access attempts and malicious behavior. Through the analysis of Canary Tokens, which act as unique identifiers triggered upon interaction, we can trace the origin of these attacks to specific IP addresses. Utilizing this information, security professionals gain insights into the geographical distribution of attackers, aiding in threat intelligence, incident response, and the implementation of targeted security measures. This integration of project honeypots and Canary Tokens enhances network defense strategies, providing organizations with a proactive stance against cyber threats.

Downloads

Download data is not yet available.

References

Vipasha Chaudhary, Dr. Purushottam Sharma, Dr Vinod Kr Shukla, Vikas Deep. “Tracking and Tracing proxy enabled system” (ICRITO) Amity University, Noida, India. Sep 3-4, 2021.

Hane Miller, Kevin Curran, Tom Lunney “Detection of Anonymising Proxies Using Machine Learning” S. International Journal of Digital Crime and Forensics Volume 13, Issue 6, 2021.

Hou-Hsuan, Stephen Huang, Zechun Cao. “Detecting Malicious Users Behind Circuit-Based Anonymity Networks” S IEEE access Dec 1 2020.

Samuel Decanioa, Michael Soltysa, Kimo Hildreth “Voyager: Tracking with a Click” KES International. 10.1016/j.procs.2020.08.11.

Downloads

Published

03-04-2024

Issue

Section

Research Articles

How to Cite

Cyber Honeypot. (2024). International Journal of Scientific Research in Science and Technology, 11(2), 94-98. https://doi.org/10.32628/IJSRST52411168

Similar Articles

1-10 of 99

You may also start an advanced similarity search for this article.