Skip to main content

Multi-purpose Web Application Honeypot to Detect Multiple Types of Attacks and Expose the Attacker’s Identity

  • Conference paper
  • First Online:
Computational Vision and Bio-Inspired Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1420))

  • 713 Accesses

Abstract

 Anti-virus and firewall programs are software programs that protect a system from intruders and various types of viruses. While these software programs are very effective against known viruses, they have certain vulnerabilities. Attackers may use these issues as a medium to launch an attack on the system. Such perilous situations demand a mechanism which takes on cyberattacks and studies them, further using the obtained knowledge to prevent such attacks. One such mechanism is a honeypot which creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities while exposing their identity. They also reduce the risk of false positives, when compared to traditional cybersecurity measures, because they are extremely unlikely to attract legitimate activity. The proposed scheme is an implementation of such mechanism. It is a Web application which exposes the attacker’s identity when he/she applies any of the three strategies to attack on the application. These strategies would be brute force attack, static resource attack and use of web scraping

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adithyan, A., Sivabalan, K., Hariharan, A., Haritha, N., Camillus, P., Kumar, P.D.: Lsaf: A novel comprehensive application and network security framework for linux. In: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1., pp. 1289–1292. IEEE (2021)

    Google Scholar 

  2. Gjermundrød, H., Dionysiou, I.: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), pp. 630–635. IEEE (2015)

    Google Scholar 

  3. Tsikerdekis, M., Zeadally, S., Schlesener, A., Sklavos, N.: Approaches for preventing honeypot detection and compromise. In: Global Information Infrastructure and Networking Symposium (GIIS), vol. 2018, pp. 1–6 . IEEE (2018)

    Google Scholar 

  4. Kuwatly, I., Sraj, M., Al Masri, Z., Artail, H.: A dynamic honeypot design for intrusion detection. In: The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings, pp. 95–104. IEEE (2004)

    Google Scholar 

  5. Chen, J.I.Z., Yeh, L.T.: Analysis of the impact of mechanical deformation on strawberries harvested from the farm. J. ISMAC (3) 166–172 (2020)

    Google Scholar 

  6. Kambow, N., Passi, L.K.: Honeypots: the need of network security. Int. J. Comput. Sci. Inf. Technol. 5(5), 6098–6101 (2014)

    Google Scholar 

  7. Prathapani, A., Santhanam, L., Agrawal, D.P.: Intelligent honeypot agent for blackhole attack detection in wireless mesh networks. In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 753–758. IEEE (2009)

    Google Scholar 

  8. Naik, N., Jenkins, P.: A fuzzy approach for detecting and defending against spoofing attacks on low interaction honeypots. In: 2018 21st International Conference on Information Fusion (Fusion), pp. 904–910. IEEE (2018)

    Google Scholar 

  9. Belqruch, A., Maach, A.: Scada security using ssh honeypot. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security, pp. 1–5 (2019)

    Google Scholar 

  10. Nasution, A.M., Zarlis, M., Suherman, S.: Analysis and implementation of honeyd as a low-interaction honeypot in enhancing security systems. Randwick Int. Soc. Sci. J. 2(1), 124–135 (2021)

    Article  Google Scholar 

  11. Zulkurnain, N.F., Rebitanim, A.F., Malik, N.A.: Analysis of thug: A low-interaction client honeypot to identify malicious websites and malwares. In: 2018 7th International Conference on Computer and Communication Engineering (ICCCE), pp. 135–140. IEEE (2018)

    Google Scholar 

  12. Fan, W., Du, Z., Fernández, D., Villagrá, V.A.: Enabling an anatomic view to investigate honeypot systems: a survey. IEEE Syst. J. 12(4), 3906–3919 (2017)

    Article  Google Scholar 

  13. Naik, N., Jenkins, P., Cooke, R., Yang, L.: Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots. In: 2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), pp. 1–8. IEEE (2018)

    Google Scholar 

  14. Valicek, M., Schramm, G., Pirker, M., Schrittwieser, S.: Creation and integration of remote high interaction honeypots. In: 2017 International Conference on Software Security and Assurance (ICSSA), pp. 50–55. IEEE (2017)

    Google Scholar 

  15. Saibaba, G., Sanivarapu, P.V.: Developing an userfriendly online shopping web-site. Indonesian J. Electr. Eng. Comput. Sci. 12(3), 1126–1131 (2018)

    Article  Google Scholar 

  16. Fan, W., Fernández, D.: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems. In: 2017 IEEE Conference on Network Softwarization (NetSoft), pp. 1–9. IEEE (2017)

    Google Scholar 

  17. Shakya, S., Nepal, L.: Computational enhancements of wearable healthcare devices on pervasive computing system. J. Ubiquitous Comput. Commun. Technol. (UCCT) 2(02), 98–108 (2020)

    Google Scholar 

  18. Sonthi, V.K., Nagarajan, S., Murali Krishna M, M., Giridhar, K., Lalitha, V.L., Mohan, V.M.: Imminent threat with authentication methods for AI data using blockchain security. In: Blockchain Security in Cloud Computing, pp. 283–303. Springer (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Prasanth Vaidya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sri Latha, P., Prasanth Vaidya, S. (2022). Multi-purpose Web Application Honeypot to Detect Multiple Types of Attacks and Expose the Attacker’s Identity. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds) Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1420. Springer, Singapore. https://doi.org/10.1007/978-981-16-9573-5_21

Download citation

Publish with us

Policies and ethics