You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Assets/Projects/IoT18/IoT_Review-01_Presentation.md
+67-26Lines changed: 67 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,28 @@
1
-
# Configuration:
2
-
We configured RaspberryPi to enable ssh service on boot and automatically connect to a wifi router to get an ip address
1
+
# Honeypot Architecture with Raspberry Pi
3
2
3
+
## Overview of the setup
4
+
This project sets up a honeypot using a Raspberry Pi to detect network attacks and redirect malicious traffic to a decoy server. The system is designed to:
5
+
- Detect port scans using **PSAD** (Port Scan Attack Detector)
6
+
- Redirect attackers to a honeypot (decoy server)
7
+
- Provide network connectivity through an **Access Point (AP)**
8
+
- Allocate dynamic IP addresses using **dnsmasq**
9
+
- Route legitimate sensor data to a secure web server
4
10
5
-
## Stage 1:
6
-
we used raspberry pi, inbuilt wifi interface (wlan0) to connect to the router/Personal Hostpot and attain IP address.
7
-
After the connection, the packets will be processed and actions are preformed according to some firewall rules.
8
-
constraint: If a port scan happens on the any machine over the network, the psad service will alert the root user on raspberry pi and redirects the attacker to the HoneyPot.
11
+
## Architecture Stack
12
+

9
13
10
-
**psad.conf**
14
+
## Configuration
15
+
The Raspberry Pi is configured to:
16
+
- Enable **SSH** on boot
17
+
- Automatically connect to a **Wi-Fi router** to obtain an IP address
The Raspberry Pi uses its built-in Wi-Fi interface (**wlan0**) to connect to the network. Traffic is monitored, and firewall rules dictate how packets are processed.
21
+
22
+
### Constraints
23
+
- If a **port scan** is detected on any machine in the network, **PSAD** alerts the root user and redirects the attacker to the honeypot.
-**Hostapd**: used to configure the virtual wifi interface as access point.
97
+
### Access Point Configuration with **Hostapd**
98
+
`hostapd` configures the Wi-Fi interface as an access point.
81
99
```Hostapd
82
100
interface=wlan0_ap
83
101
driver=nl80211
@@ -91,10 +109,33 @@ auth_algs=1
91
109
#wpa_key_mgmt=WPA-PSK
92
110
#rsn_pairwise=CCMP
93
111
```
94
-
## Stage 3
95
-
At stage 3, we used 2 virtual machines running web servers which are mirrors to each other but the purpose is different.
96
-
One webserver collects all the sensor data from the legit user and sends it through the raspberry pi to the webserver that is hosted on the **vm1**
97
112
98
-
if any attacker trys a port over the network, the psad service on raspberrypi detects the attack and redirect the user to **honeypot** that is on **vm2**
113
+
## Stage 3: Web Server Configuration
114
+
At this stage, two virtual machines (VMs) are set up:
115
+
1.**VM1 (Legitimate Web Server)**: Collects sensor data from authenticated users
116
+
2.**VM2 (Honeypot Web Server)**: Decoy system for attackers redirected by PSAD
117
+
118
+
### Network Configuration
119
+
- Both VMs use **bridged adapters** to allow direct communication.
120
+
- Sensor data from legitimate users is forwarded to **VM1** through the Raspberry Pi.
121
+
- If an attacker performs a **port scan**, **PSAD detects the activity** and reroutes their traffic to **VM2 (honeypot).**
122
+
123
+
## Summary
124
+
This project implements a **honeypot-based intrusion detection system** using a Raspberry Pi. It leverages **PSAD** to detect network attacks and dynamically redirects attackers to a honeypot environment, while maintaining secure communication for legitimate users.
125
+
126
+
### Technologies Used
127
+
-**Raspberry Pi 3B+**
128
+
-**PSAD** (Port Scan Attack Detector)
129
+
-**iptables** (Firewall Configuration)
130
+
-**dnsmasq** (DHCP Server)
131
+
-**hostapd** (Wireless Access Point Setup)
132
+
-**Linux Networking** (Bridged Adapter for VMs)
133
+
134
+
### Future Enhancements
135
+
- Implement logging and analytics for honeypot interactions.
136
+
- Automate reporting of detected attackers.
137
+
- Introduce more sophisticated honeypot deception techniques.
138
+
139
+
---
140
+
This README provides a comprehensive guide to setting up the Raspberry Pi-based honeypot system. Happy hacking (ethically)! 🚀
99
141
100
-
both the **vms** are connected using the bridged adapter for direct communication.
0 commit comments