Design and analysis of a honeypot Pi for intrusion detection system

D. Saravana Kumar, Alicia Biju, Raja Muthalagu, Pranav M. Pawar, Abdul Rajak

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

As the digital age progresses, vulnerabilities in cybersecurity continue to increase due to the rise of hackers and intruders, so we will need different methods to be ahead of them. Today, one of the most practiced and successful solutions is Honeypot. In reality, it is so effective that many organizations set up these honeypots to understand the vast majority of cyber assaults. The chapter discusses about how honeypots can lure and manipulate attackers and trace their footsteps to build better solutions and provide prevention techniques. The chapter concentrates on the design, development, and analysis of a medium-level interaction honeypot, incorporating it into an Intrusion Detection System that will be placed on a Raspberry Pi. "Cowrie" is chosen as the honeypot for this project to create an Intrusion Detection System. The honeypot will present itself as a legitimate working network system. It will assist in identifying malicious activities and intrusions of an attacker which get recorded in real time. This honeypot will be used only for research purposes and not for production.

Original languageEnglish
Title of host publicationHardware Security
Subtitle of host publicationChallenges and Solutions
PublisherSpringer Nature
Pages125-138
Number of pages14
ISBN (Electronic)9783031812132
ISBN (Print)9783031812125
DOIs
StatePublished - 3 Mar 2025
Externally publishedYes

Bibliographical note

Publisher Copyright:
© The Author(s). All rights reserved.

Fingerprint

Dive into the research topics of 'Design and analysis of a honeypot Pi for intrusion detection system'. Together they form a unique fingerprint.

Cite this