Encrypted Honeypot Security System

  • Azham Ahmad UCTATI
  • Muhd Zakaria Sharbudin
Keywords: Honeypot, honeyd, DDOS, Port Scanning, Nmap, TorsHammer

Abstract

A cyber honeypot operates in a similar way in computer security terms, baiting a trap for hackers. It is a sacrificial computer device that, like a decoy, is supposed to attract cyberattacks. It mimics a destination for hackers and uses their attempts at infiltration to collect data about cyber criminals and how they work or to divert them from other targets. The purpose of this project is to create the Encrypted Honeypot System and, by port scanning and DDOS attack, to demonstrate or test the Encrypted Honeypot System. The configuration of the honeypot and tools to be used for the attack that is Port Scanning will also show in this project that Nmap will be used and TorsHammer will be used for the DDOS attack and the result of the honeypot will show the two attacks by the attacker in this project for the last segment.

Published
27-05-2021
How to Cite
Ahmad, A., & Sharbudin, M. Z. (2021). Encrypted Honeypot Security System. International Journal of Synergy in Engineering and Technology, 2(1), 50-60. Retrieved from https://ijset.tatiuc.edu.my/index.php/ijset/article/view/79