Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Minal Shahzad, Zainab Awais and Sana Shafqat"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Web trap
    (UMT, Lahore, 2022) Minal Shahzad, Zainab Awais and Sana Shafqat
    Web Trap is a defensive scheme designed to enhance the security of a website as well as act as bait for the attacker to monitor his activities. It is an automated network that consists of three main components i.e., Mod Sec, ELK, and MISP. Mod Sec acts as a firewall and generates logs, these logs are sent to ELK which handles the logs and gives them a pictorial presentation to interact with. Lastly, after filtering the malicious and suspicious logs, the logs are sent to MISP which is an intelligent threat-sharing platform. It handles the logs accordingly and reports the malicious attacks to the community or the organization. The implementation requires some tools and software for the deployment of the system which are briefly discussed in the document. The system is handled by the Deceptive Server team who monitors and interacts with the logs, attackers, and users. Moreover, the system can be enhanced with more functionalities and features in the future with the increasing security advancements.

DSpace software copyright © 2002-2026 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback