Abstract
Anti-virus and firewall programs are software programs that protect a system from intruders and various types of viruses. While these software programs are very effective against known viruses, they have certain vulnerabilities. Attackers may use these issues as a medium to launch an attack on the system. Such perilous situations demand a mechanism which takes on cyberattacks and studies them, further using the obtained knowledge to prevent such attacks. One such mechanism is a honeypot which creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities while exposing their identity. They also reduce the risk of false positives, when compared to traditional cybersecurity measures, because they are extremely unlikely to attract legitimate activity. The proposed scheme is an implementation of such mechanism. It is a Web application which exposes the attacker’s identity when he/she applies any of the three strategies to attack on the application. These strategies would be brute force attack, static resource attack and use of web scraping
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adithyan, A., Sivabalan, K., Hariharan, A., Haritha, N., Camillus, P., Kumar, P.D.: Lsaf: A novel comprehensive application and network security framework for linux. In: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1., pp. 1289–1292. IEEE (2021)
Gjermundrød, H., Dionysiou, I.: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), pp. 630–635. IEEE (2015)
Tsikerdekis, M., Zeadally, S., Schlesener, A., Sklavos, N.: Approaches for preventing honeypot detection and compromise. In: Global Information Infrastructure and Networking Symposium (GIIS), vol. 2018, pp. 1–6 . IEEE (2018)
Kuwatly, I., Sraj, M., Al Masri, Z., Artail, H.: A dynamic honeypot design for intrusion detection. In: The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings, pp. 95–104. IEEE (2004)
Chen, J.I.Z., Yeh, L.T.: Analysis of the impact of mechanical deformation on strawberries harvested from the farm. J. ISMAC (3) 166–172 (2020)
Kambow, N., Passi, L.K.: Honeypots: the need of network security. Int. J. Comput. Sci. Inf. Technol. 5(5), 6098–6101 (2014)
Prathapani, A., Santhanam, L., Agrawal, D.P.: Intelligent honeypot agent for blackhole attack detection in wireless mesh networks. In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 753–758. IEEE (2009)
Naik, N., Jenkins, P.: A fuzzy approach for detecting and defending against spoofing attacks on low interaction honeypots. In: 2018 21st International Conference on Information Fusion (Fusion), pp. 904–910. IEEE (2018)
Belqruch, A., Maach, A.: Scada security using ssh honeypot. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security, pp. 1–5 (2019)
Nasution, A.M., Zarlis, M., Suherman, S.: Analysis and implementation of honeyd as a low-interaction honeypot in enhancing security systems. Randwick Int. Soc. Sci. J. 2(1), 124–135 (2021)
Zulkurnain, N.F., Rebitanim, A.F., Malik, N.A.: Analysis of thug: A low-interaction client honeypot to identify malicious websites and malwares. In: 2018 7th International Conference on Computer and Communication Engineering (ICCCE), pp. 135–140. IEEE (2018)
Fan, W., Du, Z., Fernández, D., Villagrá, V.A.: Enabling an anatomic view to investigate honeypot systems: a survey. IEEE Syst. J. 12(4), 3906–3919 (2017)
Naik, N., Jenkins, P., Cooke, R., Yang, L.: Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots. In: 2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), pp. 1–8. IEEE (2018)
Valicek, M., Schramm, G., Pirker, M., Schrittwieser, S.: Creation and integration of remote high interaction honeypots. In: 2017 International Conference on Software Security and Assurance (ICSSA), pp. 50–55. IEEE (2017)
Saibaba, G., Sanivarapu, P.V.: Developing an userfriendly online shopping web-site. Indonesian J. Electr. Eng. Comput. Sci. 12(3), 1126–1131 (2018)
Fan, W., Fernández, D.: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems. In: 2017 IEEE Conference on Network Softwarization (NetSoft), pp. 1–9. IEEE (2017)
Shakya, S., Nepal, L.: Computational enhancements of wearable healthcare devices on pervasive computing system. J. Ubiquitous Comput. Commun. Technol. (UCCT) 2(02), 98–108 (2020)
Sonthi, V.K., Nagarajan, S., Murali Krishna M, M., Giridhar, K., Lalitha, V.L., Mohan, V.M.: Imminent threat with authentication methods for AI data using blockchain security. In: Blockchain Security in Cloud Computing, pp. 283–303. Springer (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sri Latha, P., Prasanth Vaidya, S. (2022). Multi-purpose Web Application Honeypot to Detect Multiple Types of Attacks and Expose the Attacker’s Identity. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds) Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1420. Springer, Singapore. https://doi.org/10.1007/978-981-16-9573-5_21
Download citation
DOI: https://doi.org/10.1007/978-981-16-9573-5_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9572-8
Online ISBN: 978-981-16-9573-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)