DATA LEAKAGE DETECTION AND PREVENTION SYSTEM
HONEYPOT BASED Security Operations Center (SOC) is developed to address the rising security threats faced by modern web applications, particularly brute force attacks that attempt to gain unauthorized access through repeated login attempts. Detecting such attacks at an early stage is essential to prevent data breaches, service disruption, and unauthorized system access.
The system deploys a honeypot website using Apache2 on Ubuntu Linux to simulate a realistic web environment that attracts malicious login activity. Multiple login attempts are generated through the Ubuntu Terminal to produce detailed log data capturing attacker behavior. These logs are forwarded to Splunk, which functions as the Security Operations Center (SOC) platform for collecting, indexing, and analyzing security events. Splunk enables the identification of attack patterns, tracking of source IP addresses, and generation of alerts when suspicious behavior exceeds predefined thresholds.
S, H. H. (2026). Data Leakage Detection and Prevention System. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.311
S, HARI. "Data Leakage Detection and Prevention System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.311.
S, HARI. "Data Leakage Detection and Prevention System." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.311.
2.Chris Sanders, Practical Web Penetration Testing, Wiley — Covers web application attacks, logging, and monitoring techniques useful for web honeypots.
3.Mukesh Choudhary, Mastering Honeypots: Art of Deception for Cybersecurity Defense, BPB Publications — Practical guide on deploying and managing web-based honeypots integrated with SOCs.
4.Chee Keong Ng, Lei Pan & Yang Xiang, Honeypot Frameworks and Their Applications: A New Framework, Springer — Includes framework design for web honeypots and analysis workflows.
5.Alfred Basta & Nadine Basta, Open Source Security Operations Center (SOC): A Complete Guide — Explains SOC monitoring, log analysis, and response mechanisms relevant for web-based honeypots.