0% found this document useful (0 votes)
10 views9 pages

Research - Day (1) - Read-Only - Compatibility Mode

pdf for sample purpose.

Uploaded by

Nk vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views9 pages

Research - Day (1) - Read-Only - Compatibility Mode

pdf for sample purpose.

Uploaded by

Nk vignesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9

STUDENTS RESEARCH DAY 2024

MONITORING HONEYPOT AND DETECTING


CYBER ATTACK

SHRUTHIKA S / IV CS
SIBHI CHAKRAVARTHI B / IV CS
VIGNESH N K / IV CS
Batch No: CS2024012
Name of the Mentor : Ms.S.POORANI
SCREENSHOTS
CONTENTS
INTRODUCTION
ABSTRACT
TO PROBLEM DOMAIN

1. Objective
2. Proposed Work – Architecture Diagram
3. Modules
4. Results and Discussion
5. References
LITERATURE
LITERATURE SURVEY
OBJECTIVES
ABSTRACT
REVIEW
1. Implement Cowrie Honeypot: Deploy and configure the Cowrie honeypot on the
designated server to simulate SSH servers and attract potential attackers.

2. Data Collection and Analysis: Collect and analyze data generated by Cowrie to
identify patterns indicative of cyber attacks, including brute-force login attempts,
command injections, and privilege escalation attempts.

3. Vulnerability Assessment: Assess vulnerabilities within the network infrastructure


identified through data analysis, including misconfigured SSH settings, outdated
software versions, and inadequate access controls.

4. Real-time Monitoring and Alerting: Implement mechanisms for real-time


monitoring of Cowrie logs to detect suspicious activity and generate alerts for
prompt response by security personnel.

5. Report Generation: Generate comprehensive reports based on the analysis of


collected data, highlighting detected vulnerabilities, cyber attack trends, and
recommendations for improving security measures.
REFERENCES
REFERENCES
PROPOSED WORK : ARCHITECTURE DIAGRAM
ABSTRACT
REFERENCES
REFERENCES
SCREENSHOTS
RESEARCH
ABSTRACT
CHALLENGES
MODULES
1.Deploy cowrie honeypot:

•Configure Cowrie to run as a service and define its behavior, including setting up
logging and interaction parameters.
•Implement security measures within Cowrie to detect and log unauthorized access
attempts attract potential attackers targeting the SSH protocol.

2. Data Acquisition:

•This module would be responsible for collecting the data HoneyScanner needs to
function.
Potential functionalities include:
• Scanning for honeytokens (fake access credentials) placed by security
researchers. Scraping data from cowrie honeypot .
• Interacting with APIs to retrieve relevant information.
REFERENCES
REFERENCES
SCREENSHOTS
RESEARCH
ABSTRACT
CHALLENGES
MODULES
3.Data Analysis:

• This module would process the collected data to identify potential security
threats.
• Potential functionalities include:
• Analyzing the structure and format of honeytokens.
• Identifying patterns or indicators of malicious activity.
• Extracting useful insights from the scraped data .

4.Deployment & Reporting:

•This module would present the security assessment of cowrie honeypot.


•Potential functionalities include:
• Generating reports that detail identified threats and potential vulnerabilities.

•Reports on active and passive attacks are generated.


REFERENCES
REFERENCES
SCREENSHOTS
RESEARCH
RESULTSABSTRACT
CHALLENGES
AND DISCUSSION
1. Detection of Cyber Attacks: The monitoring system successfully detected a variety
of cyber attacks targeting the SSH protocol.Real-time alerts enabled security
personnel to promptly respond to potential threats, brute-force login attempts,
command injection, and privilege escalation attempts.
2. Identification of Vulnerabilities: The analysis of collected data revealed
vulnerabilities within the network infrastructure.
3. Insights into Attack Patterns: Through advanced data analysis techniques, insights
were gained into emerging attack patterns and tactics used by cyber adversaries.
This included the identification of common attack vectors, reconnaissance activities,
and evasion techniques employed by attackers.
By leveraging advanced data analysis techniques and proactive defense measures,
organizations can effectively detect, analyze, and mitigate cyber threats, thereby
safeguarding critical assets and maintaining trust and confidence in their digital
infrastructure.
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[1] Y. Shan, Y. Yao, T. Zhao, and W. Yang, "NeuPot: A Neural Network-Based Honeypot for
Detecting Cyber Threats in Industrial Control Systems," in IEEE Transactions on Industrial
Informatics, vol. 19, no. 10, pp. 1-3 , 2023.

[2] M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, and D. Mohaisen,


“Exploring the Attack Surface of Blockchain: A Comprehensive Survey,” IEEE Communications
Surveys & Tutorials, vol. 22, no. 3, pp. 1977–2008, 2020.

[3] Hironori Uchibori, Katsunari Yoshioka and Kazumasa Omote, “Honeypot Method to Lure
Attackers without Holding Crypto-Assets” , Blockchain, vol. 11, pp. 2-4, 2023.

[4] L. Zobal, D. Kolar, and R. Fujdiak, “Current state of honeypots and deception strategies in
cybersecurity,” in 2019 11th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT), pp. 1–9, 2023.
REFERENCES
REFERENCES
SCREENSHOTS
SCOPE
ABSTRACT
OF THE WORK
REFERENCES
[5] B. Rashidi, C. Fung, K. W. Hamlen, and A. Kamisinski, “Honeyv: A virtualized honeynet
system based on network softwarization,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations
and Management Symposium, pp. 1–5, 2018.

[6] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data" in IEEE Transactions on Parallel and Distributed
Systems, vol. 27, no. 2, pp. 9-21, 2016.

[7] M. S. Ali and M. S. Hossain, "Evaluation of Cowrie SSH/Telnet Honeypot in Detecting and
Monitoring Cyber Attacks," in IEEE Access, vol. 8, pp. 8780-8790, 2020.

[8] L. Shi, Y. Li, T. Liu, J. Liu, B. Shan, and H. Chen, “Dynamic Distributed Honeypot Based on
Blockchain,” IEEE Access, vol. 7, pp. 34–46, 2019.

You might also like