Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]
Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UiTM Cawangan Perlis
2024
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf https://ir.uitm.edu.my/id/eprint/103968/ https://jcrinn.com/index.php/jcrinn |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.103968 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.1039682024-10-18T09:47:15Z https://ir.uitm.edu.my/id/eprint/103968/ Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] jcrinn Mohd Fuzi, Mohd Faris Mazlan, Muhammad Fahimuddin Jamaluddin, Muhammad Nabil Fikri Abd Halim, Iman Hazwam Intrusion detection systems (Computer security). Computer network security. Hackers Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches or signature-based detection to identify and categorise attacks. However, with the growing complexity and diversity of cyber threats, these methods often struggle to keep pace with evolving attack techniques. Modern honeypots, such as T-Pot, have become multi-faceted systems that provide researchers with a wealth of data. They could emulate different vulnerabilities and services, thus attracting a wide array of cyberattacks. This ability to simulate real-world systems and networks allowed for a detailed analysis of attack methodologies and helped to understand the evolving nature of cyber threats. As attacks became more sophisticated, so did the strategies to combat them. This included understanding the landscape of cyber threats, anticipating potential vulnerabilities, and staying ahead of the attackers. Thus, this project aims to implement a complex honeypot system with capabilities to detect and prevent cyberattacks. The project will involve designing the honeypot infrastructure, collecting data on attacks, integrating the model into the honeypot system for real-time analysis, generating reports and alerts based on the analysis, and continuously improving the system's defences. The tests revealed that honeypots can perform real cyberattacks, as well as detect and warn about threats. This project used Nmap, Hydra, and Hping3 to pretend to be attackers and show that the honeypot could fake network resources and attract them, which makes it a smart network intrusion detection system. There was a lot of experimental data on how well the honeypot could find things. Each test checked how well the honeypot could find threats on the network. In conclusion, these tests proved that the honeypot's methods for finding threats are correct, which means it can indeed find network breaches. UiTM Cawangan Perlis 2024-09 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.]. (2024) Journal of Computing Research and Innovation (JCRINN) <https://ir.uitm.edu.my/view/publication/Journal_of_Computing_Research_and_Innovation_=28JCRINN=29/>, 9 (2): 28. pp. 348-360. ISSN 2600-8793 https://jcrinn.com/index.php/jcrinn |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Intrusion detection systems (Computer security). Computer network security. Hackers |
spellingShingle |
Intrusion detection systems (Computer security). Computer network security. Hackers Mohd Fuzi, Mohd Faris Mazlan, Muhammad Fahimuddin Jamaluddin, Muhammad Nabil Fikri Abd Halim, Iman Hazwam Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
description |
Honeypots have become invaluable tools in the field of cybersecurity, allowing researchers to gain insights into attacker behaviour, collect data on malicious activities, and develop effective defence strategies. Traditionally, honeypots relied on rule-based approaches or signature-based detection to identify and categorise attacks. However, with the growing complexity and diversity of cyber threats, these methods often struggle to keep pace with evolving attack techniques. Modern honeypots, such as T-Pot, have become multi-faceted systems that provide researchers with a wealth of data. They could emulate different vulnerabilities and services, thus attracting a wide array of cyberattacks. This ability to simulate real-world systems and networks allowed for a detailed analysis of attack methodologies and helped to understand the evolving nature of cyber threats. As attacks became more sophisticated, so did the strategies to combat them. This included understanding the landscape of cyber threats, anticipating potential vulnerabilities, and staying ahead of the attackers. Thus, this project aims to implement a complex honeypot system with capabilities to detect and prevent cyberattacks. The project will involve designing the honeypot infrastructure, collecting data on attacks, integrating the model into the honeypot system for real-time analysis, generating reports and alerts based on the analysis, and continuously improving the system's defences. The tests revealed that honeypots can perform real cyberattacks, as well as detect and warn about threats. This project used Nmap, Hydra, and Hping3 to pretend to be attackers and show that the honeypot could fake network resources and attract them, which makes it a smart network intrusion detection system. There was a lot of experimental data on how well the honeypot could find things. Each test checked how well the honeypot could find threats on the network. In conclusion, these tests proved that the honeypot's methods for finding threats are correct, which means it can indeed find network breaches. |
format |
Article |
author |
Mohd Fuzi, Mohd Faris Mazlan, Muhammad Fahimuddin Jamaluddin, Muhammad Nabil Fikri Abd Halim, Iman Hazwam |
author_facet |
Mohd Fuzi, Mohd Faris Mazlan, Muhammad Fahimuddin Jamaluddin, Muhammad Nabil Fikri Abd Halim, Iman Hazwam |
author_sort |
Mohd Fuzi, Mohd Faris |
title |
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
title_short |
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
title_full |
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
title_fullStr |
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
title_full_unstemmed |
Performance analysis of network intrusion detection using T-Pot honeypots / Mohd Faris Mohd Fuzi ... [et al.] |
title_sort |
performance analysis of network intrusion detection using t-pot honeypots / mohd faris mohd fuzi ... [et al.] |
publisher |
UiTM Cawangan Perlis |
publishDate |
2024 |
url |
https://ir.uitm.edu.my/id/eprint/103968/1/103968.pdf https://ir.uitm.edu.my/id/eprint/103968/ https://jcrinn.com/index.php/jcrinn |
_version_ |
1814058504668839936 |
score |
13.209306 |