International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
ISSN: 2583-6129

Impact Factor: 6.674

Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites.

[featured_image]
Download
Download is available until [expire_date]
  • Version
  • Download 55
  • File Size 391.16 KB
  • File Count 1
  • Create Date 10 May 2024
  • Last Updated 10 May 2024

Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites.

Design and Implementation of a Honeypot-based Intrusion Detection System for Mitigating SQL Injection-based Botnet Attacks in E-commerce Websites.

Mr.C.Mani M.E Assistant Professor, Department Of Computer Science and Engineering, Nandha Engineering

College(Autonomous), Erode.

Santhosh K,

Department Of Computer Science and Engineering, Nandha Engineering College(Autonomous), Erode.

Santhosh M,

Department Of Computer Science and Engineering, Nandha Engineering College(Autonomous), Erode.

Snehan D J,

Department Of Computer Science and Engineering, Nandha Engineering College(Autonomous), Erode.

Vijay Anand V, Department Of Computer Science and Engineering, Nandha Engineering College(Autonomous), Erode.

Abstract: Sensitive data on e-commerce websites has been more vulnerable to cyberattacks in recent years, especially when those assaults take advantage of SQL injection flaws. Botnets are a ubiquitous hazard that increase the risks by automating large-scale attacks. This paper provides a new method for preventing SQL injection-based botnet assaults on e-commerce websites by creating and deploying an intrusion detection system (IDS) based on honeypots. By tricking attackers into interacting with dummy systems and then watching and analyzing their actions, the suggested solution seeks to proactively detect and neutralize such attacks. Our system improves the security posture of e-commerce platforms by using a combination of machine learning algorithms, anomaly detection techniques, and honeypot deployment. This protects sensitive client data and maintains business integrity.

Keywords: E-commerce, SQL injection, Botnet, Honeypot, Intrusion Detection System, Machine Learning, Anomaly Detection

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics.research...
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More