Cyber Honeypot
DOI:
https://doi.org/10.32628/IJSRST52411168Keywords:
Cyber Threats, Honeypot, IP Address Tracking, Security, Canary TokensAbstract
In an era of escalating cyber threats, the need for robust defenses against malicious activities is paramount. In this project, we propose a novel approach to leverage honeypots in conju nction with Canary Tokens to accurately pinpoint the geographical locations of attackers. By strategically deploying these decoy resources across diverse network environments, we capture valuable data on unauthorized access attempts and malicious behavior. Through the analysis of Canary Tokens, which act as unique identifiers triggered upon interaction, we can trace the origin of these attacks to specific IP addresses. Utilizing this information, security professionals gain insights into the geographical distribution of attackers, aiding in threat intelligence, incident response, and the implementation of targeted security measures. This integration of project honeypots and Canary Tokens enhances network defense strategies, providing organizations with a proactive stance against cyber threats.
Downloads
References
Vipasha Chaudhary, Dr. Purushottam Sharma, Dr Vinod Kr Shukla, Vikas Deep. “Tracking and Tracing proxy enabled system” (ICRITO) Amity University, Noida, India. Sep 3-4, 2021.
Hane Miller, Kevin Curran, Tom Lunney “Detection of Anonymising Proxies Using Machine Learning” S. International Journal of Digital Crime and Forensics Volume 13, Issue 6, 2021.
Hou-Hsuan, Stephen Huang, Zechun Cao. “Detecting Malicious Users Behind Circuit-Based Anonymity Networks” S IEEE access Dec 1 2020.
Samuel Decanioa, Michael Soltysa, Kimo Hildreth “Voyager: Tracking with a Click” KES International. 10.1016/j.procs.2020.08.11.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.