Reducing honeypot log storage capacity consumption - cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.]

Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occur...

Full description

Saved in:
Bibliographic Details
Main Authors: Abd Halim, Iman Hazwam (Author), Abu Hassan, Nur Muhammad Irfan (Author), Razak, Tajul Rosli (Author), Jamaluddin, Muhammad Nabil Fikri (Author), Ismail, Mohammad Hafiz (Author)
Format: Book
Published: UiTM Cawangan Perlis, 2019.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_59775
042 |a dc 
100 1 0 |a Abd Halim, Iman Hazwam  |e author 
700 1 0 |a Abu Hassan, Nur Muhammad Irfan  |e author 
700 1 0 |a Razak, Tajul Rosli  |e author 
700 1 0 |a Jamaluddin, Muhammad Nabil Fikri  |e author 
700 1 0 |a Ismail, Mohammad Hafiz  |e author 
245 0 0 |a Reducing honeypot log storage capacity consumption - cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.] 
260 |b UiTM Cawangan Perlis,   |c 2019. 
500 |a https://ir.uitm.edu.my/id/eprint/59775/1/59775.pdf 
500 |a  Reducing honeypot log storage capacity consumption - cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.]. (2019) Journal of Computing Research and Innovation (JCRINN) <https://ir.uitm.edu.my/view/publication/Journal_of_Computing_Research_and_Innovation_=28JCRINN=29/>, 4 (1): 3. pp. 16-26. ISSN 2600-8793  
520 |a Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty when it is being processed and analyzed by the network administrator as it required a lot of time and resources. Therefore, in this paper, we propose an approach to decrease the log size that is by using a Cron job that will run with a Perl-script. This approach parses the collected data into the database periodically to decrease the log size. Three DDoS attack cases were conducted in this study to show the increasing of the log size by sending a different amount of packet per second for 8 hours in each case. The results have shown that by utilizing the Cron job with Perl-script, the log size has been significantly reduced, the disk space used in the system has also decreased. Consequently, this approach capable of speeding up the process of parsing the log file into the database and thus, improving the overall system performance. This study contributes to providing a pathway in reducing honeypot log storage using the Cron job with Perl-Script. 9557950050599 
546 |a en 
690 |a Coding theory 
690 |a Intrusion detection systems (Computer security). Computer network security. Hackers 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/59775/ 
787 0 |n https://crinn.conferencehunter.com/ 
787 0 |n 10.24191/jcrinn.v4i1.114 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/59775/  |z Link Metadata