Technical Reports

Report Date Covered Start
2017-11-20
Report Date Covered End
2018-04-20
Report Submission Date
2018-07-20
Project Implementation Countries
Pakistan
Project Leaders
Dr. Muhammad Yousaf
Team Members
Mr. Tariq Saraj [email protected]
Mr. Sohaib Jamil [email protected]
Partner Organizations
1) Faculty of Computing, Riphah International University, Islamabad, 2) Associated Press of Pakistan, 3) National Engineering and Scientific Commission
Total Budget Approved
AUD 29,300

Deployment of Collaborative Modern HoneyNet to improve Regional Cybersecurity Landscape (CMoHN)

Dr. Muhammad Yousaf

Firewalls, IDS/IPS, SIEM Solutions, Anti-virus, and other such information security products have been efficient to detect and prevent the known cybersecurity attacks. However, these devices have the built-in limitation in identifying new attack strategies and mechanisms. Along with these security products, honeynets are an integral part of the emerging secure network infrastructure of the modern age enterprises. Honeypot concept has been around for many years for engaging and learning about the hacker's attack strategies. This project aimed to achieve the following objectives: To establish core competency in deployment and integration of different honeypots and honeynets, To establish core competency in designing new honeypots for countering the current cyber-attacks, To establish an Internal Research Honeynet, To establish an External Production Honeynet, To establish a multi-site collaborative Honeynet Network, To connect with other honeynets in the region to form a regional collaborative honeynet network, To promote R&D activities around the secure network infrastructures by publishing our work in the reputed international conferences and journals, To promote secure network infrastructure practices by conducting community awareness seminars. In order to achieve the objectives of the project, we established two teams. Team-one consisted of research engineers that got expertise in deploying and integration of different honeypots and honeynets. This team successfully deployed the internal research and a couple of external production honeynets. Team-two consisted of the graduate research students who voluntarily took interest in the project activities and contributed in designing new honeypots for embedded Linux devices to counter the attacks against the Internet of Things (IoT) devices and establishing the interface between honeynet and the other security devices like firewalls. With our deployed honeypots and honeynets at a number of locations, we are now able to observe thousands of cyber-attacks daily on our sites. This is helping us to identify the extent and variety of the attacks being faced by the organizations in this region.