Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]

Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd Fuzi, Mohd Faris, Mazlan, Muhammad Fahimuddin, Jamaluddin, Muhammad Nabil Fikri, Abd Halim, Iman Hazwam
Format: Article
Language:English
Published: UiTM Cawangan Perlis 2024
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf
https://ir.uitm.edu.my/id/eprint/103968/
https://jcrinn.com/index.php/jcrinn
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.103968
record_format eprints
spelling my.uitm.ir.1039682024-10-18T09:47:15Z https://ir.uitm.edu.my/id/eprint/103968/ Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] jcrinn Mohd Fuzi, Mohd Faris Mazlan, Muhammad Fahimuddin Jamaluddin, Muhammad Nabil Fikri Abd Halim, Iman Hazwam Intrusion detection systems (Computer security). Computer network security. Hackers Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches or signature-based detection to identify and categorise attacks. However, with the growing complexity and diversity of cyber threats, these methods often struggle to keep pace with evolving attack techniques. Modern honeypots, such as T-Pot, have become multi-faceted systems that provide researchers with a wealth of data. They could emulate different vulnerabilities and services, thus attracting a wide array of cyberattacks. This ability to simulate real-world systems and networks allowed for a detailed analysis of attack methodologies and helped to understand the evolving nature of cyber threats. As attacks became more sophisticated, so did the strategies to combat them. This included understanding the landscape of cyber threats, anticipating potential vulnerabilities, and staying ahead of the attackers. Thus, this project aims to implement a complex honeypot system with capabilities to detect and prevent cyberattacks. The project will involve designing the honeypot infrastructure, collecting data on attacks, integrating the model into the honeypot system for real-time analysis, generating reports and alerts based on the analysis, and continuously improving the system's defences. The tests revealed that honeypots can perform real cyberattacks, as well as detect and warn about threats. This project used Nmap, Hydra, and Hping3 to pretend to be attackers and show that the honeypot could fake network resources and attract them, which makes it a smart network intrusion detection system. There was a lot of experimental data on how well the honeypot could find things. Each test checked how well the honeypot could find threats on the network. In conclusion, these tests proved that the honeypot's methods for finding threats are correct, which means it can indeed find network breaches. UiTM Cawangan Perlis 2024-09 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]. (2024) Journal of Computing Research and Innovation (JCRINN) <https://ir.uitm.edu.my/view/publication/Journal_of_Computing_Research_and_Innovation_=28JCRINN=29/>, 9 (2): 28. pp. 348-360. ISSN 2600-8793 https://jcrinn.com/index.php/jcrinn
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Intrusion detection systems (Computer security). Computer network security. Hackers
spellingShingle Intrusion detection systems (Computer security). Computer network security. Hackers
Mohd Fuzi, Mohd Faris
Mazlan, Muhammad Fahimuddin
Jamaluddin, Muhammad Nabil Fikri
Abd Halim, Iman Hazwam
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
description Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches or signature-based detection to identify and categorise attacks. However, with the growing complexity and diversity of cyber threats, these methods often struggle to keep pace with evolving attack techniques. Modern honeypots, such as T-Pot, have become multi-faceted systems that provide researchers with a wealth of data. They could emulate different vulnerabilities and services, thus attracting a wide array of cyberattacks. This ability to simulate real-world systems and networks allowed for a detailed analysis of attack methodologies and helped to understand the evolving nature of cyber threats. As attacks became more sophisticated, so did the strategies to combat them. This included understanding the landscape of cyber threats, anticipating potential vulnerabilities, and staying ahead of the attackers. Thus, this project aims to implement a complex honeypot system with capabilities to detect and prevent cyberattacks. The project will involve designing the honeypot infrastructure, collecting data on attacks, integrating the model into the honeypot system for real-time analysis, generating reports and alerts based on the analysis, and continuously improving the system's defences. The tests revealed that honeypots can perform real cyberattacks, as well as detect and warn about threats. This project used Nmap, Hydra, and Hping3 to pretend to be attackers and show that the honeypot could fake network resources and attract them, which makes it a smart network intrusion detection system. There was a lot of experimental data on how well the honeypot could find things. Each test checked how well the honeypot could find threats on the network. In conclusion, these tests proved that the honeypot's methods for finding threats are correct, which means it can indeed find network breaches.
format Article
author Mohd Fuzi, Mohd Faris
Mazlan, Muhammad Fahimuddin
Jamaluddin, Muhammad Nabil Fikri
Abd Halim, Iman Hazwam
author_facet Mohd Fuzi, Mohd Faris
Mazlan, Muhammad Fahimuddin
Jamaluddin, Muhammad Nabil Fikri
Abd Halim, Iman Hazwam
author_sort Mohd Fuzi, Mohd Faris
title Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
title_short Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
title_full Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
title_fullStr Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
title_full_unstemmed Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
title_sort performance analysis of network intrusion detection using t-pot honeypots / mohd faris mohd fuzi ... [et al.]
publisher UiTM Cawangan Perlis
publishDate 2024
url https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf
https://ir.uitm.edu.my/id/eprint/103968/
https://jcrinn.com/index.php/jcrinn
_version_ 1814058504668839936
score 13.209306