2024-12-14 –, Rookie track 1
Due to the technological advancements in the world, using web applications to securely access shared data has become a popular choice. However, the downside to that is personal sensitive data is exposed. Around 74 % of personal data all over the internet is vulnerable to known web application attacks. Moreover, 90% of global cyberattacks happen through web applications. Keeping up with the attack vectors has become a challenge because of the ever-changing security landscape. This increase in attack surge for web applications needs a proactive and extensive solution. Cyber defenders are constantly facing new challenges in the identification of threats as cyberattacks are becoming more sophisticated hence there is a need to monitor, analyse, and mitigate these threats with priority. To address this gap, research is needed to enhance the security of web applications using honeypots, threat intelligence, and automation. This research aims to provide web developers with a solid foundation to protect against the growing range of cyber risks.
This project involves enhancing the security posture of the web applications by deploying ModSecurity based honeypots over Amazon EC2 instances to lure the attacker to use various tools and attack techniques to compromise the application and logging the attack vectors for threat analysis. These Amazon EC2 instances are spread across different regions of the world to cover the global landscape. The output of these honeypots is logged in a S3 bucket in JSON format which can be used as a threat intelligence dataset for finding web traffic anomalies. Furthermore, we can use a JSON visualisation tool such as JSON crack for pattern matching and detect the anomaly in the dataset which could be useful for patching the application as well as creating a baseline for the web developers for future development.
Yes
I am a security professional currently pursuing a Master’s in Cyber Security Management at the University of Warwick, specialising in digital forensics, threat hunting, pentesting and security monitoring.
I have been recognised in the Bug Bounty Hall of Fame by numerous organisations and acknowledged by India’s National Critical Information Infrastructure Protection Centre for responsible vulnerability disclosures. I hold a Bachelor of Engineering in Information Technology and several certifications, including Certified Red Team Operator.
I am actively engaged in projects like deploying honeypots for threat intelligence and building a digital forensics lab, which reflects my commitment to advancing cybersecurity practices.