scholarly journals Analysis of Hacker Attack Using Honeypot High Interaction

2018 ◽  
Vol 14 ◽  
Author(s):  
Wahyu Purnama Sari ◽  
I Nyoman Adhi Palguna Putra

Information is a corporate asset that should be kept confidential access to parties who are not responsible. Aspects of the security of the information to be protected includes the Confidentiality, Integrity and Availability. A wide range of attacks and threats can be made to take over the assets of the desired information. A hacker is someone who has the ability to penetrate security systems of a company. There are several types of hacker attacks performed, i.e. SQL Injection, Cross Site Scripting (XSS), Brute Force, Distributed-Denial-of-Service (DDoS), Inclusion, Code Injection and more. Honeypot is a security technology that aims to identify, find security gaps and contribute actively when there are security intrusions on information technology activities. High Interaction Honeypot (Hihat) may record and collect information more specific attacks and more. The type of attack that was recorded by the Honeypot Hihat is then analyzed to find out the type of attack that most got into XYZ Company.

2011 ◽  
Vol 3 (1) ◽  
pp. 33-36
Author(s):  
Jonas Juknius ◽  
Antanas Čenys

The networks of compromised and remotely controlled computers (bots) are widely used in many Internet fraudulent activities, especially in the distributed denial of service attacks. Brute force gives enormous power to bot masters and makes botnet traffic visible; therefore, some countermeasures might be applied at early stages. Our study focuses on detecting botnet propagation via public websites. The provided algorithm might help with preventing from massive infections when popular web sites are compromised without spreading visual changes used for malware in botnets.


2019 ◽  
Vol 4 (2) ◽  
pp. 15-20
Author(s):  
Nur Khairani Kamarudin ◽  
Farah Shazwani Ismail ◽  
Mahfudzah Othman ◽  
Nurul Hidayah Ahmad Zukri ◽  
Mohd Faris Mohd Fuzi

Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. A penetration testing was conducted in order to test the security performance by conducting four security attacks which were Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.  


Author(s):  
Vidya M. S. ◽  
Mala C. Patil

<span>The usage of existing Internet architecture is shrouded by various security loopholes and hence is highly ineffective towards resisting potential threats over internet. Hence, it is claimed that future internet architecture has been evolved as a solution to address this security gaps of existing internet architecture. Therefore, this paper initiates its discussion by reviewing the existing practices of web security in conventional internet architecture and has also discussed about some recent solutions towards mitigating potentially reported threats e.g. cross-site scripting, SQL inject, and distributed denial-of-service. The paper has also discussed some of the recent research contribution towards security solution considering future internet architecture. The proposed manuscripts contributes to showcase the true effectiveness of existing approaches with respect to advantages and limitation of existing approaches along with explicit highlights of existing research problems that requires immediate attention.</span>


2018 ◽  
Vol 18 (4) ◽  
pp. 541-577 ◽  
Author(s):  
SUSAN ARIEL AARONSON

AbstractFor almost a decade, executives, scholars, and trade diplomats have argued that filtering, censorship, localization requirements, and domestic regulations are distorting the cross-border information flows that underpin the internet. Herein I use process tracing to examine the state and implications of digital protectionism. I make five points: First, I note that digital protectionism differs from protectionism of goods and other services. Information is intangible, highly tradable, and some information is a public good. Secondly, I argue that it will not be easy to set international rules to limit digital protectionism without shared norms and definitions. Thirdly, the US, EU, and Canada have labeled other countries policies’ protectionist, yet their arguments and actions sometimes appear hypocritical. Fourth, I discuss the challenge of Chinese failure to follow key internet governance norms. China allegedly has used a wide range of cyber strategies, including distributed denial of service (DDoS) attacks (bombarding a web site with service requests) to censor information flows and impede online market access beyond its borders. WTO members have yet to discuss this issue and the threat it poses to trade norms and rules. Finally, I note that digital protectionism may be self-defeating. I then draw conclusions and make policy recommendations.


2013 ◽  
pp. 35-64 ◽  
Author(s):  
Giovanna Michelon

The aim of this paper is to study if and how impression management varies during different phases of the legitimation process, in particular during the legitimacy building and legitimacy repairing phases (Suchman, 1995). We aim at understanding whether and how the disclosure tone adopted by a company in the two different moments is diverse and thus functional to the intrinsic objective of the each phase. The empirical analysis focuses on the case of British Petroleum Plc. We investigated the impression management practices undertaken by the company both during the preparation of the rebranding operation, i.e. a situation in which the company is trying to build legitimacy; and during the happenings of two legitimacy crises, like the explosion of the refinery in Texas City and the oil spill in the Gulf of Mexico. The evidence appears in line with the theoretical prediction of legitimacy theory. Results show that while the company tends to privilege image enhancement techniques during the legitimacy-building phase, it uses more obfuscation techniques when managing a legitimacy-repairing process. Moreover, the analysis suggests that the company makes more extensive use of impression management techniques in the disclosures addressed to shareholders, investors and other market operators than in the disclosures addressed to the wide range of other stakeholders.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


2001 ◽  
Author(s):  
David Mankins ◽  
Rajesh Krishnan ◽  
Ceilyn Boyd ◽  
John Zao ◽  
Michael Frentz

Sign in / Sign up

Export Citation Format

Share Document