Research Article

Analysis of Cyber Attacks Using Honeypot

Volume: 7 Number: 5 September 15, 2024
EN TR

Analysis of Cyber Attacks Using Honeypot

Abstract

In the cybersecurity world, the concept of a honeypot is generally referred to as trap systems that have real system behaviors, intentionally leave a security gap, and aim to collect information about cybercriminals who want to access them. It is a computer system that sets itself as a target to attract cyberattacks like bait. It is used to imitate a target such as cyberattackers and to learn about attack attempts, ways of working, or to distract them from other targets. In this study, a VoIP-based honeypot was used to determine the profiles of cyberattacks and attackers. A network environment was created using a low-interaction honeypot to analyze the behavior of cyberattackers and identify the services frequently preferred by these individuals. The honeypot in the network environment was monitored for a period of 90 days. 105,308 events were collected regarding protocols such as Telnet, SIP, SSH, SMB, and HTTP. There was no complex malware attack on the observed system. The service that was most attacked was determined to be Telnet. It was determined that many attacks occurred from the same IP address, indicating that automatic scanning tools were used. According to the results obtained, the proposed method performed a detailed analysis of the services from which cyberattacks came and the behaviors of the people who carried out these attacks. In addition, the highest level of understanding of user interaction was achieved thanks to the VoIP-based honeypot.

Keywords

References

  1. Abdulqadder IH, Zou D, Aziz IT. 2023. The dag blockchain: a secure edge assisted honeypot for attack detection and multi-controller based load balancing in sdn 5g. Future Gener Comput Syst, 141: 339-354.
  2. Ackerman P. 2020. Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization. BPB Publications, Delhi, India, pp: 243.
  3. Adiou ML, Benzaïd C, Taleb T. 2022. Topotrust: a blockchain-based trustless and secure topology discovery in sdns. International Wireless Communications and Mobile Computing (IWCMC), May 30- June 03, Dubrovnik, Croatia, pp: 1107–1112.
  4. Agarwal Y. 2022. Apache Log4j Logging Framework and Its Vulnerability. MSc Thesis, Metropolia University of Applied Sciences, Department of Information Technology, Metropolia, Finland, pp: 67.
  5. Akiyama M, Yagi T, Hariu T, Kadobayashi Y. 2018. Honeycirculator: distributing credential honeytoken for introspection of web-based attack cycle. Int J Info Secur, 17(2): 135-151.
  6. Altunay HC, Albayrak Z, Çakmak M. 2024. Autoencoder-based intrusion detection in critical infrastructures. Curr Trends Comput, 2(1): 1-12.
  7. Bartwal U, Mukhopadhyay S, Negi R, Shukla S. 2022. Security orchestration, automation, and response engine for deployment of behavioural honeypots. IEEE Conference on Dependable and Secure Computing (DSC), June 22-24, Edinburgh, UK, pp: 1-8.
  8. Bringer ML, Chelmecki CA, Fujinoki H. 2012. A survey: Recent advances and future trends in honeypot research. Int J Comput Network Info Secur, 4(10): 63.

Details

Primary Language

English

Subjects

Information Security Management

Journal Section

Research Article

Early Pub Date

September 4, 2024

Publication Date

September 15, 2024

Submission Date

August 10, 2024

Acceptance Date

September 3, 2024

Published in Issue

Year 2024 Volume: 7 Number: 5

APA
Altunay, H. C. (2024). Analysis of Cyber Attacks Using Honeypot. Black Sea Journal of Engineering and Science, 7(5), 954-959. https://doi.org/10.34248/bsengineering.1531420
AMA
1.Altunay HC. Analysis of Cyber Attacks Using Honeypot. BSJ Eng. Sci. 2024;7(5):954-959. doi:10.34248/bsengineering.1531420
Chicago
Altunay, Hakan Can. 2024. “Analysis of Cyber Attacks Using Honeypot”. Black Sea Journal of Engineering and Science 7 (5): 954-59. https://doi.org/10.34248/bsengineering.1531420.
EndNote
Altunay HC (September 1, 2024) Analysis of Cyber Attacks Using Honeypot. Black Sea Journal of Engineering and Science 7 5 954–959.
IEEE
[1]H. C. Altunay, “Analysis of Cyber Attacks Using Honeypot”, BSJ Eng. Sci., vol. 7, no. 5, pp. 954–959, Sept. 2024, doi: 10.34248/bsengineering.1531420.
ISNAD
Altunay, Hakan Can. “Analysis of Cyber Attacks Using Honeypot”. Black Sea Journal of Engineering and Science 7/5 (September 1, 2024): 954-959. https://doi.org/10.34248/bsengineering.1531420.
JAMA
1.Altunay HC. Analysis of Cyber Attacks Using Honeypot. BSJ Eng. Sci. 2024;7:954–959.
MLA
Altunay, Hakan Can. “Analysis of Cyber Attacks Using Honeypot”. Black Sea Journal of Engineering and Science, vol. 7, no. 5, Sept. 2024, pp. 954-9, doi:10.34248/bsengineering.1531420.
Vancouver
1.Hakan Can Altunay. Analysis of Cyber Attacks Using Honeypot. BSJ Eng. Sci. 2024 Sep. 1;7(5):954-9. doi:10.34248/bsengineering.1531420

                            24890