Honeypot in the Cyber Space

Authors

  • Astha Mk Student, CS department, Shri Ramswaroop college of engineering and management, Luckow
  • Anany Verma Student, CS department, Shri Ramswaroop college of engineering and management, Luckow
  • Dr. Sadhna Rana Professor, CS department, Shri Ramswaroop college of engineering and management, Luckow
  • Er. Himanshi Singh Assistant Professor, CS department, Shri Ramswaroop college of engineering and management, Luckow

DOI:

https://doi.org/10.53573/rhimrj.2025.v12n4.011

Keywords:

honeypot, cloud security, DDoS, optimization technique

Abstract

In today’s world a large number of devices are connected to the network, which indicates that there could exist more access nodes than before from where an intruder can try to attack and gain access to the network and its connected devices. As technology is evolving rapidly it’s difficult to keep pace with the latest trends in cyber space. The already existing defense mechanisms that have been used traditionally are falling behind to keep pace with the evolutions in the field of cyber security. In the recent times every device we own is somehow connected to the network. Thus, a greater number of cyber threats are evolving rapidly and the traditional mechanisms are not at par with the current trends like firewalls, (IDS) intrusion detection system and (IPS)intrusion prevention system. This paper presents a comprehensive study on the life cycle of honeypot systems, emphasizing planning, deployment, operation, data collection, analysis, maintenance, and evolution phases. It also discusses the different types of honeypots based on interaction levels and deployment methods, highlighting inherent challenges and considerations in modern cybersecurity infrastructures. This paper throws light on the life cycle of a honeypot and its implementation as a telnet honeypot. That is used to record any unauthorized login attempts and create log files that can be used for further analysis about the attacks performed on the honeypot. The honeypot shows a telnet vulnerability that could be used for remote login which can be easily found by an intruder and not to the public. Further the honeypot records the activity, attacks and more in the form of logs.

Author Biographies

Astha Mk, Student, CS department, Shri Ramswaroop college of engineering and management, Luckow

Astha MK is an aspiring cyber security professional from Lucknow, currently pursuing a B. Tech in Computer Science and Engineering at Shri Ramswaroop Memorial College of Engineering and Management. Passionate about ethical hacking and cyber security , Astha has worked on projects like honeypot using python and packet sniffer tool. She has interned at IBM, where she built projects and worked on tools likenmap, hydra, burpsuite etc. Proficient in Python, JavaScript, HTML/CSS, and tools like Jupyter Notebook and MySQL, Astha aims to build smart, scalable solutions and continuously evolve as a tech professional.

Anany Verma, Student, CS department, Shri Ramswaroop college of engineering and management, Luckow

 Anany Verma is an aspiring cyber security professional from Lucknow, currently pursuing a B. Tech in Computer Science and Engineering at Shri Ramswaroop Memorial College of Engineering and Management. Passionate about ethical hacking and cyber security, Anany has worked on projects like honeypot using python and packet sniffer tool. he has interned at IBM, where he built projects and worked on tools like nmap, hydra, burpsuite etc. Proficient in Python, JavaScript, HTML/CSS, and tools like Jupyter Notebook and MySQL, Astha aims to build smart, scalable solutions and continuously evolve as a tech professional.

Dr. Sadhna Rana, Professor, CS department, Shri Ramswaroop college of engineering and management, Luckow

Dr.Sadhana Rana is currently serving as an Assistant Professor in the Department of Computer Science and Engineering. She holds a Ph.D. in Computer Science and Engineering, awarded in 2016. She completed her M. Tech in 2010 and earned her B. Tech degree in Computer Science and Engineering in 2006. Additionally, she holds a Diploma in Engineering from the Board of Technical Education, U.P., Lucknow, completed in 2003. With over 14 years of teaching experience, Dr. Rana has made valuable contributions to the academic community through her research work and publications. Her areas of expertise span core computing disciplines, and she remains actively engaged in mentoring students and pursuing scholarly research. She is known for her commitment to academic excellence and innovation in computer science education.

Er. Himanshi Singh, Assistant Professor, CS department, Shri Ramswaroop college of engineering and management, Luckow

Er. Himanshi Singh is currently serving as a faculty member in the Department of Computer Science and Engineering. With a passion for teaching and research, the author has consistently worked towards nurturing the academic growth of students and contributing to the advancement of knowledge in the field of computer science. Areas of interest include software engineering, cybersecurity, artificial intelligence, and data analytics. The author remains dedicated to fostering an environment of innovation, critical thinking, and academic excellence within the department.

References

A Review on Honeypots Manikandan K1, Shambhavi Rai21Associate Professor, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India2Student, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India

Rajbhar, Vivekanand. “INTRUSION DETECTION&PREVENTION USING HONEYPOT.” InternationalJournal of Advanced Research in Computer Science 9.4(2018).

Fraunholz, Daniel, Marc Zimmermann, and Hans D.Schotten. “An adaptive honeypot configuration,Deployment and maintenance strategy.” 2017 19thInternational Conference on AdvancedCommunication Technology (ICACT). IEEE, 2017.

Abdullahi, Mukhtar Ahmad, S. Aliyu, and S. B. Junaidu.“AN ENHANCED INTRUSION DETECTION SYSTEMUSING HONEYPOT AND CAPTCHA TECHNIQUES.FUDMA JOURNAL OF SCIENCES-ISSN: 2616-1370 3.3(2019): 202-209.

Toor, Jashanpreet Singh, and Er Abhinav Bhandari.“DEPLOYMENT OF LOW INTERACTION HONEYPOT INA PRIVATE NETWORK.” International Journal ofAdvanced Research in Computer Science 8.7 (2017).

Sekar, K. R., et al. “Dynamic Honeypot ConfigurationFor Intrusion Detection.” 2018 2nd InternationalConference on Trends in Electronics and Informatics(ICOEI). IEEE, 2018

Campbell, Ronald M., Keshnee Padayachee, and Themba Masombuka. “A survey of honeypot research:Trends and opportunities.” 2015 10th internationalConference for internet technology and securedTransactions (ICITST). IEEE, 2015.

Kakade, Nilesh, et al. “JAVA Based Honeypot: IntrusionDetection System.” (2018).

La, Quang Duy, et al. “Deceptive attack and defense Game in honeypot-enabled networks for the internet Of things.” IEEE Internet of Things Journal 3.6 (2016):1025-1035.

Kevat, Satish Mahendra. “Review on HoneypotSecurity.” International Research Journal ofEngineering and Technology (IRJET) 4.06 (2017):1200-1203.

Kumar, Dinesh, and Akshay Girdhar. “Network Monitoring & analysis along with comparative study Of honeypots.” 2017 International Conference on Intelligent Sustainable Systems (ICISS).IEEE, 2017.

https://ieeexplore.ieee.org/document/10212345

L. Spitzner, "Honeypots: Tracking Hackers," Addison-Wesley, 2003.

N. Provos and T. Holz, "Virtual Honeypots: From Botnet Tracking to Intrusion Detection," Addison-Wesley, 2007.

Y. Zeng, K. Lee, and H. Chen, "Telnet Honeypots for IoT Security," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8469-8481, Oct. 2019.

M. K. Rogers et al., "DDoS Attack Detection and Mitigation Using Honeypots," in Proc. IEEE ICC, 2018, pp. 1-7.

Downloads

Published

2025-04-19

How to Cite

Astha, M., Verma, A., Rana, S., & Singh, H. (2025). Honeypot in the Cyber Space. RESEARCH HUB International Multidisciplinary Research Journal, 12(4), 86–93. https://doi.org/10.53573/rhimrj.2025.v12n4.011