International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 2161
ISSN 2229-5518
THE RESEACH AND DESIGN OF HONEYPOT SYSTEM IN THE LAN SECURITY
Prof .R.V.Agawane , Mr.JagrutiNaikare, Ms.ChaitraliLonkar, Ms. AparnaSawant,
————————————————————
Now a days the attacks are increasing very rapidly hence controlling them and maintaining its LOG is being difficult. Especially in LAN it becomes difficult for the admin to control the attacks that are been made. In LAN the attackers are mostly attracted by the servers. Since all the data is provided on server. So providing security to Server is important task.Moreover the attackers are hidden. So it becomes difficult for the admin to know the attack. Hence the concept of Honeypot was introduced. If the information regarding the attacker is known then it becomes useful in future.
.
The Cuckoo’s Egg and Evening with BerferdClifford Stoll was been developed by them in 1990/1991[5].CyberCop was the first commercial honey pot developed who’s developer was Alfred Huger. In this a single honeypot could control all the other computers in a network. It was found Cyber Cop Sting to be limited, since attackers could only connect to certain ports and read the banners.Also some Honeypot tools/ software are available such as SNORT-INLINE 12, SEBEK. Snort- Inline Snort to block and disable attacks instead of just detecting them. Sebekprovided a means to capture hacker activities in Honey Pots by logging their keystrokes in them[1].
The objective of the system is to create a dummy server that is honeypot server. The attackers then attack this sever. The Objective of the attacker is to keep the log of the attacks being made to it. The admin gets the detail LOG of the whole day. Also SMS facility is given so if the admin is not present there then he can get the details through mail. The Goal of this system is to reduce the amount of attack being made and secure the LAN form it.
The system is software which does all the functioning. In this we there is a LAN out of which one is the Honeypot server all the other are the clients. The main software is run on the Honeypot Server. In the architecture there is a LAN connected. The modules of our project are shown. There is a Honeypot server. Computers are connected in LAN by the Switch.
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 2162
ISSN 2229-5518
In this we capture the incoming packets which are coming to the honeypot system. The real time IDS (Intrusion Detection System) is used for this module. The IPAddress of the incoming packet is tracked and the IPAddress is blocked. The blacklisted IPAddress are then saved in a DAT file for further use. Also we have provide a functionality of SMS alert. If Admin is not present there then if he checks the SMS alert button SMS is send on his no regarding the attack. This module is displayed in fig. 3.
Fig 1. System architecture
This system includes 4 modules :
A. Port Scanner
In this we have to give certain range of port numbers. The module then scans and tell which ports are listening ie which are used currently and which are not listening. A log is created which specifies the details about the listening port and the date and time. This module is displayed in fig. 2.
Fig2. Port Scanner
Fig 3. Socket Scanner
C. Email Scanner
In this the E-Mail ID is provided which needs to be tracked. The mails which are received on this mail ID are blacklisted and the mails coming from this mail ID are deleted automatically. The blacklisted Email_ID are saved in a file.
\
Fig 4. Email Scanner
B. Socket Scanner
This module we have specially done for the LAN part. By this module the computer in LAN cane get the details of the
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 2163
ISSN 2229-5518
Blacklisted IP and E-mail ID. The LOG can be sent to them.
Fig 4. Client Module for Broadcasting Blacklist
• Honey Pot system can be represented by set representation as: S= {I, Bdb, F, O}
I1, I2, I3... In Є I
Where I is the input to the Honey Pot system. E.g. I1= e-mail
I2=socket connection
I3= port connection
Bdb is set of Blacklisted IPs
F is the evaluation function f1=email evaluator
f2= port scanner f3=socket scanner
O is output function where O= F (I, Bdb)
A. Algorithm for email evaluator
1) Connect to server
2) Start session
3) Specify UserID and password
4) Access folder in R/W mode
5) Access Inbox
6)for all messages m
- Read from ID
- Check if not in white list
- Check if not in Black list then add to Blacklist
Next
7) Logout and close session
8) Stop
For this algorithm time complexity can be O (N), where N is
the number of mails. Because there is no parallelism to read e- mails, fixed flow.
The basic idea in this project is to protect a network from. unauthorized use. In order to achieve this we implement HoneyPot. HoneyPots are a cheap and simple way to add protection to a network. They allow the study of attacker’s methods of operation. It help in emerging new ways for countering them.In this way the HoneyPot would provide security from the attacker and prevent our pc’s getting affected from the attacks
We would like to thank our guide Prof. Rohini V. Agawane, for her guidance and support. We will forever remain grateful for the constant support and guidance extended by guide, for the completion of paper.
Also we thank International Journal of Scientific & Engineering Research (IJSER).
REFERENCES
[1] Li Li, HuaSun ,Zhenyu Zhang, "The Research and Design of Honeypot System Applied in the LAN Security", School of Information Science and Engineering Xinjiang University Urumqi 830046, China
[2] G. Mohammed Nazer,"Current Intrusion Detection Techniques in Information Technology – A Detailed Analysis",European Journal of Scienti_c Research, EuroJournals Publishing, Inc. 2011
[3] Amit D. Lakhani,Deception Techniques Using Honeypots, Information Security Group Royal Holloway, University of London UK.
[4] Muhammad Fahd, KaleemUllahSaleh,Honeypots A Force Multiplier in Educational Domain, Lule University of Technology
[5] Addison Wesley - Honeypots - Tracking Hackers - 2002
• Prof. Rohini V. Agawane Currently working as Assistant Professor with K.J.College of Engineering & Management Research, Pune in the Department of Computer Engineering.
• Jagruti S. Naikare, currently pursuing B.E. in Computer Dept. from K J College of Engineering & Management Research, Pune. EmailID:jagrutinaikare@gmail.com
• Chaitrali V. Lonkar currently pursuing B.E. in
Computer Dept. from K J College of Engineering &
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Vo lume 4, Issue 6, June-2013
ISSN 2229-5518
2164
l\1anagement ResearcPune.
Email ID: chaitralilonkar@gmail.com
• Aparna A. Sawantcurrently pursuing B.E. in Computer Dept. from K J College of Engineering & l\1anagement ResearcPune.
Email ID : aparnaswnt@gmail.com
IJSER lb)2013