This paper is published in Volume-3, Issue-4, 2017
Area
Network and Security
Author
Rachana Khorjuwekar, Dilip Motwani
Org/Univ
Vidyalankar Institute of Technology, Mumbai, Maharashtra, India
Pub. Date
04 August, 2017
Paper ID
V3I4-1241
Publisher
Keywords
Denial of Service, Distributed Denial of Service

Citationsacebook

IEEE
Rachana Khorjuwekar, Dilip Motwani. Honeypot for Detecting Behaviour & Exposing Attacker’s Identity for Dos and Ddos Attacks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Rachana Khorjuwekar, Dilip Motwani (2017). Honeypot for Detecting Behaviour & Exposing Attacker’s Identity for Dos and Ddos Attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 3(4) www.IJARIIT.com.

MLA
Rachana Khorjuwekar, Dilip Motwani. "Honeypot for Detecting Behaviour & Exposing Attacker’s Identity for Dos and Ddos Attacks." International Journal of Advance Research, Ideas and Innovations in Technology 3.4 (2017). www.IJARIIT.com.

Abstract

Denial of Service attacks or Distributed Denial of service attacks are a big threat to the internet. Several methods, techniques and proposals are introduced to deal with the attacks but none of it has given a successful result. In this project we aim to design a honey pot to deal with Denial of service attacks and Distributed Denial of service attack. Honey pot is a recent technology in the area of computer network security. It is a computer or network segment on the internet that is set up to attract and trap people who attempt to penetrate other people’s computer system. The project focuses on designing a honey pot which appears as the original network and trap the attacker by attracting it. The honey pot will identify the identity of the attacker using some browser exploitation technique and also record the pattern of attack done by the attacker. The advantages of the system are twofold: First we can defend our operational network with a high probability against known Dos, DDoS and against new, future variants. Second, we trap the attacker so that recording of the compromise can help in a legal action against the attacker.