March. 3, 2022
Sharing information via the Internet has become more common in recent years, spanning a variety of platforms and web applications. Web-based programs that accept users’ critical information store it in databases. Due to their Internet accessibility, these programs and the databases they link to are vulnerable to a variety of information security vulnerabilities. Password Brute Force and Structured Query Language (SQL) Injection assaults are among the risks. To reduce the risk, you’ll need a security system that can detect and prevent network threats. “Honeypot is a proactive security technology in which resources are deployed in a network to observe and intercept network assaults.” SQL Injection attacks are among the top 10 vulnerabilities in web-based systems. In this sort of assault, the attacker can obtain sensitive and confidential information, which could be devastating to a company or organization. Money loss, the revelation of critical business information, a reduction in the company’s stock market value, or any combination of these might be the result.
This software design description describes the architecture and system design of Honeypot. This software design description describes how this software product will be developed to fulfill a set of technical specifications. This document is concerned with how the standards are met. Throughout the project, it serves as a guide for the development team and other stakeholders.
This software design description (SDD) explains the pipeline system design and communicates Honeypot main design perspectives to key design stakeholders. This SDD document is used to document design decisions and their reasoning to prevent conflict over previously agreed-upon products. The SDD illustrates how the software framework would be organized to meet the requirements. Since SDD is the primary source code creation material, it must provide all the programmer needs to write code. In addition to design patterns, data models, data structures, and algorithms. The SDD should describe the overall system architecture, Provide a complete description of the framework and applications that this document refers to.
A software design description (SDD) is a visual representation of a software design that can be used to keep track of design details and communicate with stakeholders. The architecture and system design of a dispersion organization are described in this software design description (SDD). The goal of this software design template is to list anything in the software, including its flow and functions, so that developers can get a general idea of the project’s architecture.
1.4 Intended audience
This document is intended for developers and system administrators who will be responsible for future changes. Developers can use this document to define the structure and design of each component during the development phase. Target market for honeypot – hackers, cyber attackers. Target market’s collective need – to save the system from cyber attacks , to observe attack pattern of hacker’s and take precautions.