Honeypots Technology To Control Cybercrime
Abstract
Today, the main challenge in the field of network security is to keep pace with the types of threats that are developing and increasing on a daily basis, in order to provide the best solution to protect any system. There are many traditional protection mechanisms such as firewalls and penetration detection systems. But it does not guarantee the detection of new types of attacks, so Honeypots techniques have been used to reveal unknown attacks. Honeypots techniques are a system that is built and configured in order to be penetrated. Therefore, it is deployed within the system in order to consume the attacker's resources, exploit his time and divert his attention away from the actual systems. They also provide a working environment for studying techniques and methods used by intruders on the system. This research introduces Honeypots techniques to simulate ... Telnet, HTTP, FTP, SSH etc. and interact with the Attacker to help to consume the attacker's resources, use his time and extract as much possible valuable information about the attacker, its techniques, and the software tools used, and divert his attention away from the actual systems. We will be using Modern Honey Network, which is a central server used to deploy and manage honeypots. The proposed framework has been implemented using the Brute-Force attack on the SSH protocol using the Nmap tool.
Full text article
Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
In a brief statement, the rights relate to the publication and distribution of research published in the journal of the University of Sebha where authors who have published their articles in the journal of the university of Sebha should how they can use or distribute their articles. They reserve all their rights to the published works, such as (but not limited to) the following rights:
- Copyright and other property rights related to the article, such as patent rights.
- Research published in the journal of the University of Sebha and used in its future works, including lectures and books, the right to reproduce articles for their own purposes, and the right to self-archive their articles.
- The right to enter a separate article, or for a non-exclusive distribution of their article with an acknowledgment of its initial publication in the journal of Sebha University.
Privacy Statement The names and e-mail addresses entered on the Sabha University Journal site will be used for the aforementioned purposes only and for which they were used.