Directing Malicious Traffic To Honeypot Using Anomaly Detection and Attribution
Directing Malicious Traffic To Honeypot Using Anomaly Detection and Attribution
Directing Malicious Traffic To Honeypot Using Anomaly Detection and Attribution
A PROJECT REPORT
Submitted by
KAUSHIK G (171351601052)
KARUPPASAMY K(171351601051)
Mrs. NIVITHA J
MAY 2020
1
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
B.S. Abdur Rahman Crescent Institute B.S. Abdur Rahman Crescent Institute
2
VIVA-VOICE EXAMINATION
3
ACKNOWLEDGEMENT
I thank the Almighty for showering His blessings upon me in completing the
project. I submit this project with a deep sense of gratitude and reverence for my beloved
parents for their moral support and encouragements.
KAUSHIK G
NOOR MOHAMED M
KARUPPASAMY K
4
ABSTRACT
Modern networks are complex and hence, network operators often rely on automation
to assist in assuring the security, availability, and performance of these networks. But
every Individual networks have their own advantage and their very own weakness which
could be easily exploited by an malicious outsider if the holes in a network system are
not carefully taken care of which could lead to exploiting the whole network and the
devices connected to it.
So to know an Individual system's weakness is to hire people to find the holes and
break into the system, so we can come up with counter measures to fix the hole and
avoid getting troubles in the future. Or we could let real malicious hackers hack into the
system, but we'll make them think they are attacking the real system while they are
actually inside a duplicated system of the original with false data in it and completely
separate from the real system, this fake system is called a honeypot.
5
TABLE OF CONTENTS
ABSTRACT V
LIST OF ABBREVIATION IX
1 INTRODUCTION
1.1 GENERAL 1
2.2 METHODOLOGY 6
3 DEVELOPMENT PROCESS
6
3.1 REQUIREMENT ANALYSIS 7
3.2 DESIGN 8
3.3 IMPLEMENTATION 12
3.4 TESTING 14
4 SCREENSHOTS 18
5.1 RESULT 22
7
5.2 CONCLUSION 23
REFERENCE 24
TECHNICAL BIOGRAPHY 90
LIST OF FIGURES
8
LIST OF ABBREVIATION
9
CHAPTER 1
INTRODUCTION
1.1 GENERAL
This project has a provision for securing the data from hacker. The intruder
whenever tries to access the original data of the user is being re-directed to a virtual
platform called HONEYPOT, where there will be a replication of the original data of the
user. But the intruder doesn’t know that he is being trapped and being monitored.
This existing project consists of how the intruder is attacking the system and with
the use of anomaly detection, the malicious user is being captured from the network
traffics and is blocked right away.
I. F. Iglesias and T. Zeby, “Analysis of network traffic features for anomaly detection,”
Mach. Learn., vol. 101, nos. 1–3, pp. 59–84, 2014. When the anomalies are detected
from the malicious user, it redirects to the HONEYPOT system and it captures the
malicious data, and make them see, what they are capable of doing, and make them
pretend they are in the original system.
10
II. Y. Gu, A. McCallum, and D. Towsley, “Detecting anomalies in network traffic using
maximum entropy estimation,” in Proc. IMC, 2005, p. 32. Anomaly detection system
significantly reduces the time needed for analyzing alarms, and also mitigate the anomaly
for detected without human intervention.
III C. Callegari, S. Vaton, and M. Pagano, “A new statistical method for detecting network
anomalies in TCP traffic,” Trans. Emer. Telecomm. Technol., vol. 21, no. 7, pp. 575–588,
2010. The basic idea was to realize a profile of the normal behavior of the system.
Denning pro-posed several statistical models to be used to build the pro-file; among these
she considered a Markov Process Model to describe the transition probabilities for a given
metric.
Use of Honeypot into the System, where there is a existing Original System,
can be the original view point for the attacker, but it is really not.
When the attackers stays for a little longer than he really should be, it will be
easier to know what the intruder is here for, or what the attacker really needs.
11
Security is very high.
Hard to know that they being trapped.
Intruder is being monitored and traced back.
And the intruder can’t access the original data of the user.
The general introduction, existing system and proposed system for this project
was discussed. The working and implementation of this system are discussed further in
the chapters. Chapter 2 discusses about the problem definition and methodology. The
development process, requirement analysis, design, implementation and the testing of
the project are discussed in chapter 3.The results of the project are analyzed and
concluded in the final chapter 4.
CHAPTER 2
12
In the previous chapter, the existing system and the proposed system for
this project are discussed . This chapter deals with the problem definition and the
methodology. The problem definition discusses about the objective of the project
and the methodology used to develop the project.
2.1 METHODOLOGY
The methodology followed in this project is top down approach. Top down
approach emphasize planning and complete understanding of the system. This
project is separated into four modules. Each module is processed that generate
the result from the given data.
13
CHAPTER – 3
DEVELOPMENT PROCESS
The input requirement for the project is all the malicious user should register their
information to login using user name and password.
The output of this project is that it is very easy to find out the unauthorized users
who are trying to get the access without the knowledge of the user is redirected to
HONEYPOT. Then the admin trace the unauthorized user or not letting him access the
original data.
14
3.1.3 Resource Requirements
Software Requirements:
Programming Language:
Tools: Pentmenu
Database: MySQL 5.5
Web server: Apache Tomcat 6.0
Hardware Requirements:
Operating System: Windows 10
RAM : 4 GB
Memory: 500 GB
3.2 DESIGN:
3.2.1 Architectural Design:
Figure 3.5 depicts the system architecture of the entire project. It defines the
structure of the developed system comprising different or modules, the externally visible
properties and the relationships shows the overall architectural design of the system.
15
Figure 3.2.1 – Architecture diagram
3.2.1.2 Firewall
Generally the firewall has two network interfaces: one for the external side of the network,
one for the internal side. Its purpose is to control what traffic is allowed to traverse from
one side to the other. As the most basic level, firewalls can block traffic intended for
particular IP addresses or server ports.
16
3.2.1.3 Anomaly Detection System (ADS)
An anomaly-based intrusion detection system, is an intrusion detection system for
detecting both network and computer intrusions and misuse by monitoring system activity
and classifying it as either normal or anomalous. ... Systems using artificial neural
networks have been used to great effect.
17
3.2.2.1 User IP address
The Internet, sometimes called the network of networks, is based upon one simple
principle: transferring information from one computer to another. In order to do this each
computer needs an identity which is called the "Internet Protocol address" or "IP address."
It is similar to a telephone number or street address.
3.3 IMPLEMENTATION
Tools used to trap or monitor intruders from accessing the data are HONEYPOT and
ANOMALY DETECTION SYSTEM (ADS)
18
If you, for instance, were in charge of IT security for a bank, you might set up a Honeypot
system that, to outsiders, looks like the bank’s network. The same goes for those in
charge of — or researching — other types of secure, internet-connected systems.
By monitoring traffic to such systems, you can better understand where cybercriminals
are coming from, how they operate, and what they want. More importantly, you can
determine which security measures you have in place are working — and which ones
may need improvement.
Honeypots are used to identify and trap attackers by presenting vulnerable systems that
appear to be a production system, but in fact they are a dummy system that is isolated
from the production environment.
Honeypots can be used to identify attackers because they can be configured to alert
when they are being attacked or have been successfully compromised. They can also be
used to trap attackers by presenting them with false information that is also set to trigger
alerts when accessed.
Utility companies should set up honeypots throughout their organization and particularly
in their perimeter and smart grid environments. By doing so, they will be able to
understand their current threats as well as the type of probes attackers are using to find
weaknesses in their infrastructure.
Finally, they can use honeypots to enact countermeasures against attackers before they
breakout of the honeypot and into the production environment.
19
3.3.4 What is anomaly detection?
Anomaly detection (aka outlier analysis) is a step in data mining that identifies data points,
events, and/or observations that deviate from a dataset’s normal behavior. Anomalous
data can indicate critical incidents, such as a technical glitch, or potential opportunities,
for instance a change in consumer behavior. Machine learning is progressively being
used to automate anomaly detection.
Finance: Anomalies could indicate illegal activities such as transactional fraud, identity
theft, network intrusion, account takeover, or money laundering. By immediately detecting
anomalies in your data--whether failed and declined transaction rates, multiple login
attempts, device usage and the transaction amount per product--performance issues and
security threats can be avoided.
Telecom: New, complex, IP-based services and their convergence with traditional voice
services makes for complex network management challenges where a service loss, even
in a small node, could affect thousands of customers.
3.4 TESTING:
20
The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to
check the functionality of components, sub-assemblies, assemblies and/or a finished
product It is the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path
of a business process performs accurately to the documented specifications and contains
clearly defined inputs and expected results.
21
3.4.3 Functional Testing
Functional tests provide a systematic demonstration that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
Business process flows: data fields, predefined processes, and successive processes
must be considered for testing. Before functional testing is complete, additional tests are
identified and the effective value of current tests is determined.
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration-oriented system integration test. System
22
testing is based on process descriptions and flows, emphasizing pre-driven process links
and integration points.
Validation succeeds when the software works in a manner expected by the user.
Software validation is achieved through a series of test cases that demonstrates with
requirements. In this project “An intelligent tool for processing natural language sentences
into structured query language” each module is tested separately.
CHAPTER – 4
SCREENSHOTS
23
Figure 4.1 represents the Command entered in the pent menu tool to make a DOS
attack.
Figure 4.2 represents the home page of the Pent menu tool
24
Figure 4.2 – Pent menu Homepage
25
Figure 4.3 represents the given port number for the target and entering random string to
pass through the packet. In this case UDP flood is used to attack
Figure 4.4 Represents the attack in progress and the number of packets sent to the
system
26
Figure 4.5 Packets are captured and monitored
27
CHAPTER 5
5.1 RESULT
Figure 4.5 shows that this project regards every attackers/hackers positive notion
on how they might be able to attack, clearly they can’t look up to this technology ,if they
have higher knowledge than us(victims).So be safe ,protect your data viably. The chapter
deals with the result analysis, conclusion and future enhancement.
5.2 CONCLUSION
There are clearly both pros and cons of adolescent technology use. The fact is, it
is important for adolescents to learn and understand technology. It's become a part of
daily life for all people to use a computer or a cell phone. It is necessary in most situations,
especially for when they are older and have jobs. However, technology use must not be
excessive. Extreme technological use in adolescents can cause all sorts of problems;
socially and physically. It is important for adolescents to understand that yes, technology
is an amazing thing; but at the same time, it should not be used all of the time. They
should not be overly dependent on it. Adolescents need to learn that sometimes,
technology is not the right answer for a situation.
Since this technology is normally used by the any organization that has the access to
various data over the world, it can be also used by some unidentified social networker to
28
get data, This Honeypot technology should be learned by every organization to protect
them from these hackers or attackers.
REFERENCE
[3] C. Callegari, S. Vaton, and M. Pagano, “A new statistical method for detecting
network anomalies in TCP traf?c,” Trans. Emer. Telecommun. Technol., vol. 21, no. 7,
pp. 575–588, 2010.
APPENDIX
./pentmenu
29
30
TECHNICAL BIOGRAPHY
Email id : noorit2515@gmail.com
Mobile No : 6381980149
31
TECHNICAL BIOGRAPHY
Email id : kaushikveni@gmail.com
Mobile No : 9710674437
32
TECHNICAL BIOGRAPHY
Email id : kprock65@gmail.com
Mobile No : 9176484581
33