Publication:
Analysis of Cyber Attacks Using Honeypot

dc.contributor.authorAltunay, Hakan Can
dc.date.accessioned2025-12-11T01:46:51Z
dc.date.issued2024
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-tempOndokuz Mayıs Üniversitesien_US
dc.description.abstractIn the cybersecurity world, the concept of a honeypot is generally referred to as trap systems that have real system behaviors, intentionally leave a security gap, and aim to collect information about cybercriminals who want to access them. It is a computer system that sets itself as a target to attract cyberattacks like bait. It is used to imitate a target such as cyberattackers and to learn about attack attempts, ways of working, or to distract them from other targets. In this study, a VoIP-based honeypot was used to determine the profiles of cyberattacks and attackers. A network environment was created using a low-interaction honeypot to analyze the behavior of cyberattackers and identify the services frequently preferred by these individuals. The honeypot in the network environment was monitored for a period of 90 days. 105,308 events were collected regarding protocols such as Telnet, SIP, SSH, SMB, and HTTP. There was no complex malware attack on the observed system. The service that was most attacked was determined to be Telnet. It was determined that many attacks occurred from the same IP address, indicating that automatic scanning tools were used. According to the results obtained, the proposed method performed a detailed analysis of the services from which cyberattacks came and the behaviors of the people who carried out these attacks. In addition, the highest level of understanding of user interaction was achieved thanks to the VoIP-based honeypot.en_US
dc.identifier.doi10.34248/bsengineering.1531420
dc.identifier.endpage959en_US
dc.identifier.issn2619-8991
dc.identifier.issue5en_US
dc.identifier.startpage954en_US
dc.identifier.trdizinid1265561
dc.identifier.urihttps://doi.org/10.34248/bsengineering.1531420
dc.identifier.urihttps://search.trdizin.gov.tr/en/yayin/detay/1265561/analysis-of-cyber-attacks-using-honeypot
dc.identifier.urihttps://hdl.handle.net/20.500.12712/46159
dc.identifier.volume7en_US
dc.institutionauthorAltunay, Hakan Can
dc.language.isoenen_US
dc.relation.ispartofBlack Sea Journal of Engineering and Scienceen_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectBilgisayar Bilimlerien_US
dc.subjectYazılım Mühendisliğien_US
dc.subjectBilgisayar Bilimlerien_US
dc.subjectBilgi Sistemlerien_US
dc.titleAnalysis of Cyber Attacks Using Honeypoten_US
dc.typeArticleen_US
dspace.entity.typePublication

Files