Honeypot-based IDS for cyber attack detection

Karthigha, M (2025) Honeypot-based IDS for cyber attack detection. 7TH INTERNATIONAL CONFERENCE ON CIVIL ENGINEERING FOR SUSTAINABLE DEVELOPMENT: ICCESD24: 040018.

Full text not available from this repository.

Abstract

As technology elaborates daily, maintaining enormous amounts of data has become a great challenge. Security becomes vulnerable starting from zero-day attacks to malware threats. It is necessary to bring a solution to this without compromising data integrity and data security. This calls for an intrusion detection system that can detect suspicious activities while alerting the users. Honeypots are one such system that enables us to carry out the same. It is a type of network security system that is becoming increasingly popular in modern network architecture due to its ability to detect malicious activities from external sources. Honeypots simulate a high-value target and lure potential attackers away from critical systems. Thus, a honeypot, in simple words, is a fake system that acts as trap alluring intruders to seek the system/data. It entices the users to perform attacks instead where information about attacks is recorded. The honeypot creates a decoy environment to divert intruders to detect, track, deter, and prevent unauthorized access to the network. As evidenced by its growing popularity in security, the honeypot is an invaluable addition to a comprehensive security plan. The project proposes a honeypot system that imitates a telnet port. This telnet port works by deceiving attackers and retrieving information about them.

Item Type: Article
Subjects: C Computer Science and Engineering > Information Security
C Computer Science and Engineering > Software Engineering
Divisions: Computer Science and Engineering
Depositing User: Dr Krishnamurthy V
Date Deposited: 08 Mar 2025 05:05
Last Modified: 08 Mar 2025 05:05
URI: https://ir.psgitech.ac.in/id/eprint/1374

Actions (login required)

View Item
View Item