IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

DATA LEAKAGE DETECTION AND PREVENTION SYSTEM

AUTHORS:
HARI HARAN S
Mentor
Dr. B. Leelavathi
Affiliation
Department of Computer Technology, Dr. N. G. P. Arts and Science College, Coimbatore, Tamil Nadu, India.
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

HONEYPOT BASED Security Operations Center (SOC) is developed to address the rising security threats faced by modern web applications, particularly brute force attacks that attempt to gain unauthorized access through repeated login attempts. Detecting such attacks at an early stage is essential to prevent data breaches, service disruption, and unauthorized system access.


The system deploys a honeypot website using Apache2 on Ubuntu Linux to simulate a realistic web environment that attracts malicious login activity. Multiple login attempts are generated through the Ubuntu Terminal to produce detailed log data capturing attacker behavior. These logs are forwarded to Splunk, which functions as the Security Operations Center (SOC) platform for collecting, indexing, and analyzing security events. Splunk enables the identification of attack patterns, tracking of source IP addresses, and generation of alerts when suspicious behavior exceeds predefined thresholds.

Keywords
Article Metrics
Article Views
32
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

S, H. H. (2026). Data Leakage Detection and Prevention System. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.311

S, HARI. "Data Leakage Detection and Prevention System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.311.

S, HARI. "Data Leakage Detection and Prevention System." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.311.

References
1.Lance Spitzner, Honeypots: Tracking Hackers, Addison-Wesley Professional — Classic book explaining honeypots, including web-based honeypots and attacker analysis.

2.Chris Sanders, Practical Web Penetration Testing, Wiley — Covers web application attacks, logging, and monitoring techniques useful for web honeypots.

3.Mukesh Choudhary, Mastering Honeypots: Art of Deception for Cybersecurity Defense, BPB Publications — Practical guide on deploying and managing web-based honeypots integrated with SOCs.

4.Chee Keong Ng, Lei Pan & Yang Xiang, Honeypot Frameworks and Their Applications: A New Framework, Springer — Includes framework design for web honeypots and analysis workflows.

5.Alfred Basta & Nadine Basta, Open Source Security Operations Center (SOC): A Complete Guide — Explains SOC monitoring, log analysis, and response mechanisms relevant for web-based honeypots.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Digital Platform to Connect Goldsmiths with Customers using AI
string(15) "C. VISHAL KUMAR" KUMAR, C. V.
(2026)
DOI: 10.55041/ijsmt.v2i3.185
Isolation of Trichoderma from Soil Sample for Production of Fungicide
string(16) "Reshma Shikalgar" Shikalgar, R.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.441
Adaptive Economic Preparedness Model (AEPM): A Five-Pillar Framework for Cost Consciousness and Micro-Adaptive Efficiency
string(23) "Ravi Kumar Neelayapalem" Neelayapalem, R. K.
(2026)
DOI: 10.55041/ijsmt.v2i3.348
Scroll to Top