KNUSTSpace >
Research Articles >
College of Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/12987

Title: Mitigating Computer Attacks in a Corporate Network using Honeypots: A Case Study of Ghana Education Service
Authors: Agbedanu, Promise R.
Hayfron-Acquah, J. B.
Twum, F.
Keywords: Computer security
Network Security
Issue Date: Apr-2018
Publisher: International Journal of Computer Applications
Citation: International Journal of Computer Applications, Volume 180 – No.32
Abstract: Computer and network security is increasingly becoming not only more significant to industry players but also complex regarding mitigating sophisticated cyber-attacks. It is essential for developers, systems administrators, and web administrators to develop and manage systems that can stand the test of time as far as computer and network attacks are concerned. A hybrid honeypot was deployed in the network setup of the Ghana Education Service. The honeypot set up was made up of Valhalla honeypot and honeyd (lowinteraction honeypots), Cowrie (medium-interaction honeypot), Windows and two Ubuntu OS implemented on real systems (high-interaction honeypot) and Snort. This research goes a step further to collect the attack on data and analyse them. The attacks that were launched against the honeypots deployed in the network were Port Scanning, SSH Brute Force attack, HTTP Authentication Brute Force attack, SQL Injection and Spam. It was discovered that the honeypots received 5061 attack connections from October to December 2017. Majority of the attack connections were TCP based, resulting in 2851 of the total attack connections. The results of this work also show that honeyd receive 36% of the total attacks launched against the honeypots.
Description: This article is published in International Journal of Computer Applications and also available at DOI: 10.5120/ijca2018916836
URI: 10.5120/ijca2018916836
Appears in Collections:College of Science

Files in This Item:

File Description SizeFormat
Mitigating Computer Attacks in a Corporate Network using Honeypots A Case Study of Ghana Education Service.pdf534.04 kBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback