English
الكلمات المفتاحية:
Honeypot ، Cowrie ، SSH ، Cybersecurity ، Network Emulationالملخص
This study presents a practical cybersecurity framework using honeypot technology to detect and analyze cyber threats. By deploying simulated systems such as Cowrie, Amun, and Wordpot within a virtualized environment using VMware and GNS3, the research demonstrates how deception can effectively engage attackers and capture their behavior. The system is integrated with the Modern Honey Network (MHN) for centralized monitoring and log collection. Simulated attacks including SSH brute-force and web probing were carried out using Kali Linux and analyzed with Wireshark. The results show that honeypots provide valuable threat intelligence, enhance detection capabilities, and support proactive defense strategies in a secure and isolated environment.
المراجع
University of Maryland. (2017). Hacking Statistics: A cyber-attack occurs every 39 seconds.
https://eng.umd.edu/news/story/study-cyberattacks-happen-on-average-every-39-seconds
Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), 597.
https://doi.org/10.3390/sym13040597
Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), 597.
https://doi.org/10.3390/sym13040597
Mohtasin, R., Prasad, P. W. C., Alsadoon, A., Zajko, G., Elchouemi, A., & Singh, A. K. (2016, March). Development of a virtualized networking lab using GNS3 and VMware workstation. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 603–609). IEEE.
https://doi.org/10.1109/WiSPNET.2016.7566232
Rafique, U. (2021). Cloud-based Research Honeypots: Technical Report [Master’s Thesis, National College of Ireland].
Morić, Z., Dakić, V., & Regvart, D. (2025). Advancing Cybersecurity with Honeypots and Deception Strategies. Informatics, 12(1). MDPI AG.
https://doi.org/10.3390/informatics12010001
Soepeno, R. A. A. P. (2023). Wireshark: An Effective Tool for Network Analysis. CYBV – Introduction to Methods of Network Analysis.
https://www.researchgate.net/publication/374978430
Yang, X., Zhang, M., Li, Y., & Wang, Q. (2023). A highly interactive honeypot-based approach to network threat management. Future Internet, 15(4), 127.
https://doi.org/10.3390/fi15040127
Raghul, S. A., Kalimuthu, R., & Kumaran, S. (2024). Enhancing cybersecurity resilience: Integrating IDS with advanced honeypot environments for proactive threat detection. In 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE.
https://doi.org/10.1109/ICAAIC60187.2024.10327178
Tetteh, S. G. (2024). Empirical Study of Agile Software Development Methodologies: A Comparative Analysis. Asian Journal of Research in Computer Science, 17(5), 30–42.