Abstract
As the digital age progresses, vulnerabilities in cybersecurity continue to increase due to the rise of hackers and intruders, so we will need different methods to be ahead of them. Today, one of the most practiced and successful solutions is Honeypot. In reality, it is so effective that many organizations set up these honeypots to understand the vast majority of cyber assaults. The chapter discusses about how honeypots can lure and manipulate attackers and trace their footsteps to build better solutions and provide prevention techniques. The chapter concentrates on the design, development, and analysis of a medium-level interaction honeypot, incorporating it into an Intrusion Detection System that will be placed on a Raspberry Pi. "Cowrie" is chosen as the honeypot for this project to create an Intrusion Detection System. The honeypot will present itself as a legitimate working network system. It will assist in identifying malicious activities and intrusions of an attacker which get recorded in real time. This honeypot will be used only for research purposes and not for production.
Original language | English |
---|---|
Title of host publication | Hardware Security |
Subtitle of host publication | Challenges and Solutions |
Publisher | Springer Nature |
Pages | 125-138 |
Number of pages | 14 |
ISBN (Electronic) | 9783031812132 |
ISBN (Print) | 9783031812125 |
DOIs | |
State | Published - 3 Mar 2025 |
Externally published | Yes |
Bibliographical note
Publisher Copyright:© The Author(s). All rights reserved.