Yinebeb T. Abewa

Work place: Addis Ababa Science and Technology University/Computer Engineering, Addis Ababa, 1000, Ethiopia

E-mail: yintar5@gmail.com

Website: https://orcid.org/0009-0007-0660-8091

Research Interests:

Biography

Yinebeb T. Abewa, Addis Ababa, Ethiopia, I received my Master of Science (MSc.) degree in Computer Engineering from Addis Ababa Science and Technology University in 2024. I currently work as a Software Engineer specializing in backend systems. My research interests lie in web application security, particularly honeypots, and backend-focused software engineering.

Author Articles
Dynamic Interactive Honeypot for Web Application Security

By Yinebeb T. Abewa Solomon Z. Melese

DOI: https://doi.org/10.5815/ijwmt.2024.06.01, Pub. Date: 8 Dec. 2024

Web application honeypots are security tools used to act as a decoy server. Over the past decades, various researches have been done on the topic. Security breaches can cause simple individual user account impersonation to bank database breaches and illegal transactions. Cybersecurity faces the daily challenge of adapting to attackers' evolving methods, including zero-day attacks. This makes intrusion detection and prevention tools unable to detect these attacks. The existing trend within the honeypot technology relies on a predefined and static level of interaction either low, medium, or high. This approach fails to account for the unpredictable nature of attack vectors and makes web application honeypots ineffective against sophisticated attacks. Application logging and request fingerprinting also have no proven methods to employ within a honeypot. A dynamic level of interaction makes the web application honeypot technology better by presenting scalable and manageable control over the attackers. We develop a modular and dynamically interactive web application honeypot capable of detecting broken access control, standard query language injection, cross-site scripting, and path traversal attack targets for web apps. We also incorporate a robust logging and fingerprinting module capable of tracing attacker requests. The proposed web application honeypot achieves an average response time of 523 milliseconds, a throughput of 105 requests per second, and an average engagement of 769.38 seconds. Improving the web application Honeypot helps organizations keep themselves ahead of attackers by empowering the significance of Honeypot. Developing a web application honeypot with a newly designed approach helps other scholars and researchers extend their work.

[...] Read more.
Other Articles