Home|Journals|Articles by Year|Audio Abstracts
 

Research Article

EEO. 2021; 20(5): 7944-7966


A Hybrid Honey Pot-As-A-Service Model To Secure The Network From Brute Force Attacks

Pothumani.Parvathi,Anuradha Chinta,S.R.Chandra Murthy Patnala.




Abstract

The term IoT suggests an internet-like construct into which network-compatible devices can be integrated to communicate with each other at any time. Security is a major concern in the IoT networks. Honey pot is used to prepare a decoy before an unauthorized intrusion or malware infection actually occurs, catch the trend in advance, and use it as a counter measure against cyber-attacks. By making the server or network vulnerable, it is targeted by the attacker. This paper describes a hybrid honey pot as a service framework that provides security in a number of ways. The proposed framework examines the available servers for defects. When any server appears to be under attack, the honey pot system is activated. The use of multiple dummy ports complicates port scanning. When brute force attacks are detected, the honey pot model is activated, feeding false data to the attackers. This contributes to the network's security against various types of attacks, and the data is securely stored in the servers. The proposed honey pot-as-a-service can protect multiple servers at the same time. These frameworks have two modules: networking module and client server module. Networking module is used to know the open ports and status of servers. In client server module, server ask client login ID, then if credentials are correct then the client get access to the original server. If client gives wrong credentials for random no. of times then divert him to access honey pot server. N Map tool was successes in finding no. of open ports and python code were used to know status of server. We took random number generator to generate random number to find hacker and client server architecture was implemented with multi threading .

Key words: Honey pot, unauthorized intrusion attacks, cyber-attacks, , IoT networks ,honey pot-as-a-service, brute force, port scanning, Brute force attack






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.