Вы находитесь на странице: 1из 2

DATA SECURITY USING HONEYPOT SYSTEM

In order to suppress malicious attacks against a back-end server, this project proposes a network model that allows for isolation from unauthorized traffic and blacklisting of misbehaving clients. Inorder to achieve this we deploy Honey pot on the network. Honeypots are decoy systems that are designed to lure a potential attacker from critical systems. Honeypots are designed to Divert an attacker from accessing critical systems, Collect information about attacker, Encourage the attacker to stay on the system long enough for administrators to respond. Each user should register with the Server. Then using the corresponding username and password it can login and request for a file from the back-end server. The authentication server will authenticate the client and verify whether the user is currently present in the network or not. If it is present the request will directed to the back-end server and the requested file will be sent to the client otherwise the request will be redirected to the Honey pot system, where the IP of the client will be traced. MODULE DESCRIPTION The project contains mainly four modules. They are: Client Front-end server Authentication server Honeypot system

CLIENT Client is the one who request for a service. This module consist of two forms such as Client login form and File request form. Every registered user will be provided with a username and password, using it a client can login request for a file through File request form. FRONT-END SERVER The front end server is responsible for forwarding client request for processing. This module contains a form named View request. The details regarding client request will be displayed here.

AUTHENTICATION SERVER This module contains three forms such as Admin login form for login into the authentication server. Add clients form for registering with the authentication server and the registered clients will be listed in the Admin home form. When a client request for a file, the authentication server will authenticate the client by checking whether it is currently present in the network. Then only the permission for accessing the file will be allowed otherwise the file cannot be accessed. HONEYPOT SYSTEM When the authentication server finds that the client currently not present in the network, then the client request will be redirected to the honeypot rather than back-end server. The honeypot system will trace the IP address of this client.

Front-end Back-end

: Java : SQL Server 2008

Вам также может понравиться