Honeypots Technology in Combat Cybercrimes

Authors

  • Ehab Waleed Aljunid Student

Keywords:

Honeypot , Cowrie , SSH , Cybersecurity , Network Emulation

Abstract

This study presents a practical cybersecurity framework using honeypot technology to detect and analyze cyber threats. By deploying simulated systems such as Cowrie, Amun, and Wordpot within a virtualized environment using VMware and GNS3, the research demonstrates how deception can effectively engage attackers and capture their behavior. The system is integrated with the Modern Honey Network (MHN) for centralized monitoring and log collection. Simulated attacks including SSH brute-force and web probing were carried out using Kali Linux and analyzed with Wireshark. The results show that honeypots provide valuable threat intelligence, enhance detection capabilities, and support proactive defense strategies in a secure and isolated environment.

References

University of Maryland. (2017). Hacking Statistics: A cyber-attack occurs every 39 seconds.

https://eng.umd.edu/news/story/study-cyberattacks-happen-on-average-every-39-seconds

Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), 597.

https://doi.org/10.3390/sym13040597

Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), 597.

https://doi.org/10.3390/sym13040597

Mohtasin, R., Prasad, P. W. C., Alsadoon, A., Zajko, G., Elchouemi, A., & Singh, A. K. (2016, March). Development of a virtualized networking lab using GNS3 and VMware workstation. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 603–609). IEEE.

https://doi.org/10.1109/WiSPNET.2016.7566232

Rafique, U. (2021). Cloud-based Research Honeypots: Technical Report [Master’s Thesis, National College of Ireland].

https://norma.ncirl.ie/5132/

Morić, Z., Dakić, V., & Regvart, D. (2025). Advancing Cybersecurity with Honeypots and Deception Strategies. Informatics, 12(1). MDPI AG.

https://doi.org/10.3390/informatics12010001

Soepeno, R. A. A. P. (2023). Wireshark: An Effective Tool for Network Analysis. CYBV – Introduction to Methods of Network Analysis.

https://www.researchgate.net/publication/374978430

Yang, X., Zhang, M., Li, Y., & Wang, Q. (2023). A highly interactive honeypot-based approach to network threat management. Future Internet, 15(4), 127.

https://doi.org/10.3390/fi15040127

Raghul, S. A., Kalimuthu, R., & Kumaran, S. (2024). Enhancing cybersecurity resilience: Integrating IDS with advanced honeypot environments for proactive threat detection. In 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE.

https://doi.org/10.1109/ICAAIC60187.2024.10327178

Tetteh, S. G. (2024). Empirical Study of Agile Software Development Methodologies: A Comparative Analysis. Asian Journal of Research in Computer Science, 17(5), 30–42.

https://doi.org/10.9734/ajrcos/2024/v17i5320

Downloads

Published

2025-08-23

How to Cite

Aljunid, E. W. (2025). Honeypots Technology in Combat Cybercrimes. مجلة الجامعة الإماراتية الدولية, 2(3), 6. Retrieved from https://eiu.edu.ye/journals/index.php/eiu/article/view/70