Honeypots Technology To Control Cybercrime

A. Dogman, M. Faneer, A. Hamza, R. Mohammed, and M. Huseen. (1)
(1) , Libya

Abstract

Today, the main challenge in the field of network security is to keep pace with the types of threats that are developing and increasing on a daily basis, in order to provide the best solution to protect any system. There are many traditional protection mechanisms such as firewalls and penetration detection systems. But it does not guarantee the detection of new types of attacks, so Honeypots techniques have been used to reveal unknown attacks. Honeypots techniques are a system that is built and configured in order to be penetrated. Therefore, it is deployed within the system in order to consume the attacker's resources, exploit his time and divert his attention away from the actual systems. They also provide a working environment for studying techniques and methods used by intruders on the system. This research introduces Honeypots techniques to simulate ... Telnet, HTTP, FTP, SSH etc. and interact with the Attacker to help to consume the attacker's resources, use his time and extract as much possible valuable information about the attacker, its techniques, and the software tools used, and divert his attention away from the actual systems. We will be using Modern Honey Network, which is a central server used to deploy and manage honeypots. The proposed framework has been implemented using the Brute-Force attack on the SSH protocol using the Nmap tool.

Full text article

Generated from XML file

Authors

A. Dogman, M. Faneer, A. Hamza, R. Mohammed, and M. Huseen.
أبوعجيلة دغمان و موسى فنير و أحمد حمزة و رجب محمد و مروان حسين. (2020). Honeypots Technology To Control Cybercrime. Journal of Pure & Applied Sciences, 19(5), 139–146. https://doi.org/10.51984/jopas.v19i5.828

Article Details

No Related Submission Found