This project involved deploying a production-grade DShield honeypot to capture and analyze live attack data from the internet. The system was designed to collect threat intelligence, identify attack patterns, and provide real-time insights into malicious activities targeting exposed systems.
The DShield honeypot was deployed using Docker containers to ensure isolation and easy management. The honeypot simulates vulnerable services including SSH, Telnet, and web services to attract attackers.
docker run -d --name dshield-honeypot \
-p 22:2222 \
-p 23:2223 \
-p 80:8080 \
-p 443:8443 \
-v /var/log/dshield:/var/log/dshield \
dshield/honeypot:latest
A sophisticated data pipeline was implemented to process honeypot logs in real-time:
The system automatically extracts and categorizes threat intelligence including:
This project provided valuable insights into real-world attack methodologies and the importance of proactive threat intelligence gathering. The honeypot demonstrated that even seemingly "empty" systems are constantly under attack, highlighting the need for robust security measures on all internet-facing systems.
The automated data processing pipeline proved crucial for handling the high volume of attack data, and the real-time alerting system enabled rapid response to emerging threats.
Back to HomeDuration: 8 weeks
Role: Threat Intelligence Analyst
Technologies: Docker, AWS, Python, Grafana
Focus Area: Threat Intelligence
SSH (67%)
Telnet (23%)
HTTP (10%)