{"title":"Performance Analysis of Honeypots Against Flooding Attack","authors":"Vasudha Mahajan, Jaspreet Singh","doi":"10.1109/ICECA55336.2022.10009485","DOIUrl":null,"url":null,"abstract":"Internet security is of the utmost importance to both consumers and organizations due to the massive risk of attack by malicious hackers. In order to increase internet security implementation of a honeypot system is one way. These honey pots are deployed by businesses and government agencies to identify the extent of network intrusions. A honeypot may be used as a reliable security forensic tool to reduce the risk of intrusions and by exposing potential system security gaps. This comprehensive study gives a concise overview of honeypots and attacks, showing honeypot as an efficient strategy for boosting internet security and a safeguard to our systems. This paper intends to test the honeypot system against syn flooding attack using a pentbox honeypot, allowing to record intrusion attempts and to analyze the attack effectiveness. Honeypot works as a cutting-edge security monitoring tool to reduce the risk of attacks on computer networks and are helpful in revealing important information about possible system security flaws.","PeriodicalId":356949,"journal":{"name":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA55336.2022.10009485","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Internet security is of the utmost importance to both consumers and organizations due to the massive risk of attack by malicious hackers. In order to increase internet security implementation of a honeypot system is one way. These honey pots are deployed by businesses and government agencies to identify the extent of network intrusions. A honeypot may be used as a reliable security forensic tool to reduce the risk of intrusions and by exposing potential system security gaps. This comprehensive study gives a concise overview of honeypots and attacks, showing honeypot as an efficient strategy for boosting internet security and a safeguard to our systems. This paper intends to test the honeypot system against syn flooding attack using a pentbox honeypot, allowing to record intrusion attempts and to analyze the attack effectiveness. Honeypot works as a cutting-edge security monitoring tool to reduce the risk of attacks on computer networks and are helpful in revealing important information about possible system security flaws.