Dr. Ayman Taha
Eng. Ahmed Hazem
Sharing information via the Internet has become more common in recent years, spanning a variety of platforms and web applications. Web-based programs that accept users’ critical information store it in databases. Due to their Internet accessibility, these programs and the databases they link to are vulnerable to a variety of information security vulnerabilities. Password Brute Force and Structured Query Language (SQL) Injection assaults are among the risks. To reduce the risk, you’ll need a security system that can detect and prevent network threats. “Honeypot is a proactive security technology in which resources are deployed in a network to observe and intercept network assaults.” SQL Injection attacks are among the top 10 vulnerabilities in web-based systems. In this sort of assault, the attacker can obtain sensitive and confidential information, which could be devastating to a company or organization. Money loss, the revelation of critical business information, a reduction in the company’s stock market value, or any combination of these might be the result.
1.Gather information such as (IP, OS, time, country, etc.) about the web application visitor.
2.Identify the identity of the visitor either he/she is an attacker or normal user.
3.Fool the attacker by diverting him to a fabricated data.
4.Generate a fake data that can’t be recognized as fake.
Our scope will be focused on four phases:
1. Monitoring the network traffic
2. Determine malicious traffic
3. Divert attacker to fabricated data
4. Monitor attacks behavior
Documents and Presentations
You will find here the documents and presentation for our proposal.
You will find here the documents and presentation for our SRS.
You will find here the documents and presentation for our SDD.
You will find here the documents and presentation for our Thesis