Research - Day (1) - Read-Only - Compatibility Mode
Research - Day (1) - Read-Only - Compatibility Mode
SHRUTHIKA S / IV CS
SIBHI CHAKRAVARTHI B / IV CS
VIGNESH N K / IV CS
Batch No: CS2024012
Name of the Mentor : Ms.S.POORANI
SCREENSHOTS
CONTENTS
INTRODUCTION
ABSTRACT
TO PROBLEM DOMAIN
1. Objective
2. Proposed Work – Architecture Diagram
3. Modules
4. Results and Discussion
5. References
LITERATURE
LITERATURE SURVEY
OBJECTIVES
ABSTRACT
REVIEW
1. Implement Cowrie Honeypot: Deploy and configure the Cowrie honeypot on the
designated server to simulate SSH servers and attract potential attackers.
2. Data Collection and Analysis: Collect and analyze data generated by Cowrie to
identify patterns indicative of cyber attacks, including brute-force login attempts,
command injections, and privilege escalation attempts.
•Configure Cowrie to run as a service and define its behavior, including setting up
logging and interaction parameters.
•Implement security measures within Cowrie to detect and log unauthorized access
attempts attract potential attackers targeting the SSH protocol.
2. Data Acquisition:
•This module would be responsible for collecting the data HoneyScanner needs to
function.
Potential functionalities include:
• Scanning for honeytokens (fake access credentials) placed by security
researchers. Scraping data from cowrie honeypot .
• Interacting with APIs to retrieve relevant information.
REFERENCES
REFERENCES
SCREENSHOTS
RESEARCH
ABSTRACT
CHALLENGES
MODULES
3.Data Analysis:
• This module would process the collected data to identify potential security
threats.
• Potential functionalities include:
• Analyzing the structure and format of honeytokens.
• Identifying patterns or indicators of malicious activity.
• Extracting useful insights from the scraped data .
[3] Hironori Uchibori, Katsunari Yoshioka and Kazumasa Omote, “Honeypot Method to Lure
Attackers without Holding Crypto-Assets” , Blockchain, vol. 11, pp. 2-4, 2023.
[4] L. Zobal, D. Kolar, and R. Fujdiak, “Current state of honeypots and deception strategies in
cybersecurity,” in 2019 11th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT), pp. 1–9, 2023.
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[5] B. Rashidi, C. Fung, K. W. Hamlen, and A. Kamisinski, “Honeyv: A virtualized honeynet
system based on network softwarization,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations
and Management Symposium, pp. 1–5, 2018.
[6] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data" in IEEE Transactions on Parallel and Distributed
Systems, vol. 27, no. 2, pp. 9-21, 2016.
[7] M. S. Ali and M. S. Hossain, "Evaluation of Cowrie SSH/Telnet Honeypot in Detecting and
Monitoring Cyber Attacks," in IEEE Access, vol. 8, pp. 8780-8790, 2020.
[8] L. Shi, Y. Li, T. Liu, J. Liu, B. Shan, and H. Chen, “Dynamic Distributed Honeypot Based on
Blockchain,” IEEE Access, vol. 7, pp. 34–46, 2019.