SlideShare a Scribd company logo
“HONEYPOT IN NETWORK SECURITY”
Network Security”
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI, KARNATAKA
B. V. V. SANGHA’S
BILURU GURUBASAVA MAHASWAMIJI INSTITUTE OF
TECHNOLOGY, MUDHOL - 587313
DEPARTMENT OF
ELECTRONICS AND COMMUNICATIONS ENGINEERING
Seminar Report on
Bachelor of Engineering in
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted By
Miss. Sunita Sulekar 2LB17EC015
Under the Guidance of
Ms. Ravi Bashetti
Assistant Professor
Department of Electronics and Communication Engineering
Biluru Gurubasava Mahaswamiji Institute of Technology
Mudhol-587313 2021-22
B. V. V. SANGHA’S
BILURU GURUBASAVA MAHASWAMIJI INSTITUTE OF
TECHNOLOGY, MUDHOL-587313
DEPARTMENT OF
ELECTRONICS AND COMMUNICATIONS ENGINEERING
CERTIFICATE
This is to certify that the Seminar work entitled “Honeypot in network security” is
a bonafide work carried out by Miss. Sunita Sulekar in partial fulfilment for the
award of Bachelor of Engineering in Department of Electronics and Communication
Engineering, Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol,
affiliated to Visvesvarayya Technological University Belgavi, Karnataka, during
the academic year of 2021-2022. It is verified that all corrections/suggestions
indicated for internal assessment have been incorporated in the report deposited in
the department library. The project report has been approved as it satisfied the
academic requirements in respect of Seminar work prescribed for the Bachelor of
Engineering Degree.
Singnature of Guide Singnature of HOD Signature of Principal
Prof`.Sneha B.Kotin Prof`.Sneha B.Kotin Prof`.S . B.Kerur
Submitted by
Miss.GangaHunasikatti 2LB18EC005
DECLARATION
I student of 8th semester Bachelor of Engineering in Department of Electronics and Communication
Engineering, Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol, affiliated to
Visvesvarayya Technological University Belgavi Karnataka, hereby we declare that the
dissertation entitled “Honeypot in network security” , Seminar work has been carried out with
our project associates at Department of Electronics and Communication Engineering, Biluru
Gurubasava Mahaswamiji Institute of Technology Mudhol, and submitted in the partial fulfilment
of the requirements for the award of degree of Bachelor of Engineering in Department of
Electronics and Communication Engineering by Biluru Gurubasava Mahaswamiji Institute of
Technology Mudhol, during the academic year of 2021-22. Further the matter embodied in
dissertation has not been submitted by anybody for the award of any degree or diploma to any
other university.
Place: Mudhol
Date:
Submitted By
Miss. Sunita Sulekar (2LB17EC015)
ACKNOWLEDGMENT
“SUCCESS IS 1% INSPIRATION AND 99% PERSIPIRATION” and it is this1% of
inspiration that enabled us to put in all hard work needed to complete the project. We consider it to
be a great privilege to place on record our profound sense of gratitude and sentiments to all those
who helped us during the course of project work.
First and foremost we would like to thank the Almighty and Our Parents for their continuous
encouragement and supporting us to successfully complete our project work.
We are highly indebted to our institution Biluru Gurubasava Mahaswamiji Institute of
Technology, Mudhol. We have taken efforts in this project. However, it would not have been
possible without the kind support and help of many individuals. We would like to extend our sincere
thanks to all of them.
We wish to thank our Principal Dr. S. B. Kerur for constantly inspiring us in all endeavours and
his valuable suggestions during the course of the Seminar.
We wish to thank our HOD Prof. Sneha B. Kotin for providing all the support and facilities to
make this project a huge success.We do grab this opportunity to express our gratitude to our guide
and Seminar coordinator Prof. Jyothi Katagi for his kind support, valuable suggestions and co-
operation during this period. His constant motivation enabled us to widen the horizon of our
project and interest in this project. Without the cheerful support of teaching and non-teaching staff
of our department whose names have not been mentioned, my Seminar would not have seen the
light of the day. We would also like to express warm gratitude to all our friends who marked their
contributions directly or indirectly inmaking this Seminar a success.
Seminar Associated by:
Sunita Sulekar 2LB17EC015
ABSTRACTION
The primary focus of this paper is to demonstrate about the exciting new technology
“HONEYPOTS” . In this era of technology, the hectic usage of internet plays a major role in all activities ranging
from education to money transactions. In order to undergo all these tasks in a healthy manner we must ensure
security in the network we use. Honeypots are the developing technology to secure our networks.
Honeypots are typically virtual machines,designed to emulate realmachines, feigning or
creating the appearance of running full services and applications,with open ports that might be found on a typical
system or server on a network. Honeypots allows the systemadministrators to“trace back” the source of hackers.
The main goal of this paper is to give an elaborateexplanation of honeypots, and how they can be deployed to
enhance organizational and enterprise security acrosscritical systems and networks.
Honeypots can do everything from detecting new attacks to tracking automated creditcard
fraud and identity theft. In the past severalyears we have seen the technology rapidly develop, with newconcepts
such as honeypot farms,commercial and open source solutions, and documented findings
TABLE OF CONTENTS
CHAPTERS PAGE
NO
1. INTRODUCTION
1.1 Introduction
1.2 History
2. DESCRIPTION
2.1 What is DevOps?
2.2 Why DevOps is needed?
2.3 Why DevOps is Used?
3. DIFFERENCEOF DEVOPS AMONG OTHERS
3.1 Difference between DevOps and traditional IT operations
3.2 Difference between DevOps and Agile
4. DEVOPS
4.1 DevOps Lifecycle
4.2 DevOps Principles
5. DEVOPS TOOLS
6. APPLICATIONS
7. FUTURE OF DEVOPS
8. CONCLUSION
9. REFERENCE
CHAPTER 1
INTRODUCTION
1 A honeypot is a trap set to detect deflect or in some manner counteract attempts at unauthorized use
of information systems
2 They are the highly flexible security tool with different application security they don’t fix a single
problem Instead they have multiple uses such as prevention detection or information gathering
3 a honeypot is an information system resource whose value lies in unauthorized use of the resource
CHAPTER 2
LASSIFIATION
CHAPTER 3
LITERATURE SURVEY
Title : “E-RTO Management System”
Authors : Manjunath S Patil, BasavarajK Madagouda, Vinod C Desai
Description: ERTO is an Automation of Road Transport Department through Cellular Network and our
ERTO is a step in the era of Mobile computing by using adobe flex and visual studio which will make it easy for
RTO [1] professionals to manage and administrate internal office data and also access it on field during enquiry
via Mobile applications. Our paper work allows in office data entry professionals not only to key in the data but
to also edit, update, delete and print information via Graphical interactive forms and on mobile flash web enabled
application. It also enables officers to pay fine which generates fine amount automatically with status such license
type, date,paid or unpaid status forms and display vehicle license, registration, emission details on just a click of
the button. On the other hand it also provides the on field officials to access data from the Database on server by
just using a php based interface by flash enabled mobile application which will fetch data from a server that is
physically present on the server with device and location independence. This means that the user with a mere
knowledge of operating a mobile can access information at his fingertips within a few seconds without physically
visiting or accessing the data from the RTO database server present on server.
TITLE : “Cross verification of vehicle and driver for RTO”
Authors : Amruta bakale,spoorti awate
Description : In this paper author surveyed problem of RTO,RTO employee having lot of work burden of
making registration ,license issue, transfer etc.,which requires lots of paper work. As a result people cannot get
things done in right time this system helpful for RTO officials to maintain record systematically and reduces lots
of paper work and manual effort. In this paper, technique has been discussed for challan system. here user
provide details to RTO database. by scanning QR code which contains overall information of the vehicle we
getvehicle owner details. This system also detect culprit vehicle. This paper introduces system would make it
easier for the public as it becomes an automated process. As the documents no need be carried, it wouldn’t be
misplaced and also misused. Hence for the safety of the documents. This system Make one unique identity as a
driver license. This system proposes, ”cross verification of driver and license for RTO”,effectively verifies
documents related to vehicle and license. This system introduces facility for RTO officials to maintain records
systematically and reduces lots of paper work and manual effort . In this paper, we have designed a security
system for QR codes. Since QR code security is essential and QR codes are increasingly used in all fields, this
system can protect users’ privacy and identity in addition to their smart phone devices. Security system can detect
attacks like: QR code fabrication, Phishing and fraud attacks. The proposed secure QR code application provides
more security level as well as maintains backward compatibility with QR codes that do not incorporate security
features. This paper proposes the optimization of traffic light controller in a city using RFID technology.
CHAPTER 4
OBJECTIVES
1. Reduce the traffic police work by obtaining information about the vehicle.
2. User does not need to carry their vehicle document every time.
3. Document expiry alert message is sent to user.
4. It is also provide mutual authentication between the police and users to avoid misusage.
5. This generated QR code is placed in the number plates of the vehicle.
6. The renewalalert is sent to the vehicle owner about payment deadline.
7. The nonpermitted vehicles can be blocked in the check-post by sending the alert messages.
CHAPTER 5
METHODOLOGYOF WORK
For the implementation of the proposed we required requirements
HARDWARE REQUIREMENTS:
➢ System : Pentium IV 2.4 GHz.
➢ Hard Disk : 60 GB.
➢ Monitor : 15 VGA Colour
➢ Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
➢ Operating system : Windows XP.
➢ Front End Coding Language : Java , XML,HTML,CSS,JS.
➢ Back End Coding Language : PHP,JSON.
➢ Tool Kit : Android 4.2 (ADT)
Admin Module Details
1. Driving License
In this module admin can add and update the user driving license as per the user verified documents details.
2. DocumentDetails
In this module admin can add and update the user Vehicle Document details as per the user verified documents
details .
3. Insurance Details
In this module admin can add and update the user vehicle Insurance as per the user verified documents details .
4 EmissionTesting
In this module admin can add and update the user vehicle Emission testing as per the user verified documents
details .
DFT Module Details
Admin Modules
Android Application (Traffic Police)
DEVOPS SEMINAR INDEX (1) (10).docx
Proposed system mainly consists of four modules 1. administrator 2. Traffic police 3. Civil police
• Driver/Owner: Provide vehicle and personal information to RTO administrator (name, address,license no.,
mobile no., adhar number, vehicle number, bill of sell etc.) and get QR code and RFID.
• RTO administrator: RTO administrator stores all the information related to vehicle and driver and generates
QR code and RFID. Also send document expiry alert message to owner when stolen vehicle detected then
instantly alert message will be send to police as well as owner of vehicle.
• Traffic Police: Scan the QR code or RFID and retrieve vehicle and user information. Also check user past
details i.e. how many times he/she violating the traffic rules(like breaking traffic rules), according to that generate
fine.
• Civil Police : Civil police plays an important role, since a web page will be provided to civil police in order to
update the stolen vehicle status to the RTO database
CHAPTER 6
APPLICATIONS
1. Driving license Information.
2. Vehicle Information.
3. Insurance Information.
4. Find stolen vehical in easy way suing QR code.
5. Need not to carry hard copy of documents.
6. Data would be stored in encrypted format.
7. More accurate is compared to current method being used.
CHAPTER 7
FUTURE SCOPE
Road accidents in India take more lives than natural disasters and diseases and these figures are on
the rise, with the aim of addressing this problem, we are suggesting some methods like electronic monitoring etc.
Electronic monitoring has a provision that the government to ensure proper electronic surveillance on natural and
state highways and urban roads. The tracking technology of most people we familiar with the global positioning
system, or GPS, satellite technology owned by the U.S government and operated by the air force but now a
commercial part of our everyday lives. GPS is used for the purposes ranging from locating lost pets to planning
road trips.
We can use a live vehicle tracking which helps to find the stolen vehicle and also with the help of this
live location tracking we control the traffic and avoiding of traffic blocks are possible by tracking the live
location of vehicles and if we use the GPS in every vehicle, then it is easy to navigate, because every navigation
system maintains a log of last few places the driver routed. This is a handy feature if you want to return to the
same place but can’t remember how you got these. So if we set a GPS tracking in every vehicle, we can make the
whole motor vehicle department a smart. Also GPS technology ensures drivers safety by checking driving
behavior. A constant tracking keeps theses away from over speeding and brash driving, so with the help of GPS
technology, you can identify drivers who exhibits good driving skills and can offer rewards or incentives
accordingly. The application can be enhanced with the concept of number plate recognition through
image/camera. This paper can enhance the application by linking it to the Aadhar Card database in order to
retrieve more details of the license/vehicle owner.
CHAPTER 8
CONCLUSION
Unique QR code for vehicle verification system is used for solving the real-time problem
which takes safe custody of the important documents such as Driving License, PUC,Insurance,RC Book etc.
which verify the vehicle documents digitally, so result in much more transparency,authenticity, and also reduce
corruption of fake documents and also reduces the administration overhead of RTO Admin
by minimizing the use of papers.
This application will notify the owner with location when his/her vehicle is undertaken for
an inspection which helps the vehicle inspectors to find the stolen vehicles quickly. Vehicle inspectors cannot
charge existing fines and bribes more because this application includes all the types of fines and amount to be
paid. Owner will get notified at the correct time when the papers are expired, also at the time of app updation and
if any fines are charged. Considering the positive aspects of the QR Code, the proposed method is brought into
actual practice will definitely prove to be a boon. The proposed project analyses the vehicle document tracking
based on QR code. By using our system the driver will goes through the verification process through a reliable
and efficient manner by a traffic inspector.
QR code is being widely used for implanting messages such that people can easily use their
Smartphone's to capture the QR code and gain relevant data from OR code reader. User can get QR code from the
RTO administration
CHAPTER 9
REFERENCE
[1] Ms. Ankita V.Ghodke and Prof. Rahul V.Dagade “Electronic Secure Vehicle Verification system using
Advanced Digi-Locker system”, IEEE,2018.
[2] Mr. Nilesh R. Patil and Prof. Rajesh Dharmik ,” Secured Cloud Architecture for Cloud Service Provider”
IEEE (WCFTR’16) , 2016
[3] N Karale,Kalyani Pendke and Prashant Dahiwale ,” The Survey of Various Techniques & Algorithms for
SMS Security Shraddha “ ,IEEE (ICIIECS’15), 2014.
[4] Mr. Niteen Surv and Mrs. Jayshree Katti,” Framework for Client Side AES Encryption Technique in Cloud
Computing “ , IEEE(IACC),2015, pp .525-528.
[5] “Strength of QR Code over Design and Implementation of verification sytem System” Lokesh S. Khedekar
and Prajakta S. Kale ,IEEE(ICCSP), 2016, pp .2190-2193.
[6] David Lorenzia, Jaideep Vaidya, Soon Chun, Basit Shafiq and Vijayalakshmi Atluri a,” Enhancing the
government service experience through QR codes on mobile platforms” ,Elsevier(Journal), 2014, pp .6-16.
[7] Wengang Hou , “A Fast Image Encryption Scheme Based on AES Yong Zhang, Xueqian Li “, IEEE(2nd
ICIVC),2017, pp .624-628.
[8] Eko Sediyono Satya Wacana Suhartono, “Secure Login by Using One-time Password verification sytem
Based on MD5 Hash Encrypted SMS “ ,IEEE(Journal), 2013, pp .1604-1608.

More Related Content

PDF
IRJET - Labtrust-Android Application for Pathology Laboratory
DOCX
Criminal navigation using email tracking system.docx
PDF
finalwithrec4
PDF
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
DOCX
Online Job Portal
PDF
778765182-HTU-Ambulance-Hiring-Portal.pdf
PDF
778765182-HTU-Ambulance-Hiring-Portal.pdf
PDF
Kirtesh Khandelwal Visual Basics Project
IRJET - Labtrust-Android Application for Pathology Laboratory
Criminal navigation using email tracking system.docx
finalwithrec4
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
Online Job Portal
778765182-HTU-Ambulance-Hiring-Portal.pdf
778765182-HTU-Ambulance-Hiring-Portal.pdf
Kirtesh Khandelwal Visual Basics Project

Similar to DEVOPS SEMINAR INDEX (1) (10).docx (20)

PDF
ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.
DOCX
major documentation(Telecom churn Based on ML).docx
DOCX
Criminsdsdsdsdsal navigation using email tracking system.docx
PDF
Report on CyberSecurity for college students
PDF
Android Based Smart Department
PDF
Sample projectdocumentation
PDF
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
PDF
Intranet database
PPTX
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
PDF
FINGERPRINT BASED SECURED VOTING
PPTX
Presentation mobile computing
PDF
IRJET- Smart Mobile Attendance System using Bluetooth Technology
PDF
Women's Maltreatment Redressal System based on Machine Learning Techniques
DOCX
TRAINING REPORT of JAVA batch 2K22 1.docx
PDF
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
PDF
Authentication system with Decentralized chat app
PDF
IRJET- Voice based Email Application for Blind People
PDF
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
PPTX
Event Management Application PROJECT REPORT_rotated.pptx
PDF
IRJET- Fingerprint based Folder Lock
ONLINE FLAT BOOKING SERVICE MINOR PROJECT REPORT.
major documentation(Telecom churn Based on ML).docx
Criminsdsdsdsdsal navigation using email tracking system.docx
Report on CyberSecurity for college students
Android Based Smart Department
Sample projectdocumentation
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
Intranet database
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
FINGERPRINT BASED SECURED VOTING
Presentation mobile computing
IRJET- Smart Mobile Attendance System using Bluetooth Technology
Women's Maltreatment Redressal System based on Machine Learning Techniques
TRAINING REPORT of JAVA batch 2K22 1.docx
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
Authentication system with Decentralized chat app
IRJET- Voice based Email Application for Blind People
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
Event Management Application PROJECT REPORT_rotated.pptx
IRJET- Fingerprint based Folder Lock
Ad

Recently uploaded (20)

DOCX
mcsp232projectguidelinesjan2023 (1).docx
PPTX
The-Scope-of-Food-Quality-and-Safety.pptx managemement
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPTX
Prokaryotes v Eukaryotes PowerPoint.pptx
PPTX
Your Guide to a Winning Interview Aug 2025.
PPTX
CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PDF
APNCET2025RESULT Result Result 2025 2025
PPTX
Principles of Inheritance and variation class 12.pptx
PDF
Sheri Ann Lowe Compliance Strategist Resume
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPTX
Surgical thesis protocol formation ppt.pptx
PPTX
STS CHAP 4 human development as reflected
PPTX
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
PDF
Blue-Modern-Elegant-Presentation (1).pdf
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PDF
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
mcsp232projectguidelinesjan2023 (1).docx
The-Scope-of-Food-Quality-and-Safety.pptx managemement
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
Prokaryotes v Eukaryotes PowerPoint.pptx
Your Guide to a Winning Interview Aug 2025.
CYBER SECURITY PPT.pptx CYBER SECURITY APPLICATION AND USAGE
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
APNCET2025RESULT Result Result 2025 2025
Principles of Inheritance and variation class 12.pptx
Sheri Ann Lowe Compliance Strategist Resume
1751884730-Visual Basic -Unitj CS B.pptx
Surgical thesis protocol formation ppt.pptx
STS CHAP 4 human development as reflected
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
Blue-Modern-Elegant-Presentation (1).pdf
Definition and Relation of Food Science( Lecture1).pptx
iTop VPN Crack Latest Version 2025 Free Download With Keygen
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
Ad

DEVOPS SEMINAR INDEX (1) (10).docx

  • 1. “HONEYPOT IN NETWORK SECURITY” Network Security” VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI, KARNATAKA B. V. V. SANGHA’S BILURU GURUBASAVA MAHASWAMIJI INSTITUTE OF TECHNOLOGY, MUDHOL - 587313 DEPARTMENT OF ELECTRONICS AND COMMUNICATIONS ENGINEERING Seminar Report on Bachelor of Engineering in ELECTRONICS AND COMMUNICATION ENGINEERING Submitted By Miss. Sunita Sulekar 2LB17EC015 Under the Guidance of Ms. Ravi Bashetti Assistant Professor Department of Electronics and Communication Engineering Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol-587313 2021-22
  • 2. B. V. V. SANGHA’S BILURU GURUBASAVA MAHASWAMIJI INSTITUTE OF TECHNOLOGY, MUDHOL-587313 DEPARTMENT OF ELECTRONICS AND COMMUNICATIONS ENGINEERING CERTIFICATE This is to certify that the Seminar work entitled “Honeypot in network security” is a bonafide work carried out by Miss. Sunita Sulekar in partial fulfilment for the award of Bachelor of Engineering in Department of Electronics and Communication Engineering, Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol, affiliated to Visvesvarayya Technological University Belgavi, Karnataka, during the academic year of 2021-2022. It is verified that all corrections/suggestions indicated for internal assessment have been incorporated in the report deposited in the department library. The project report has been approved as it satisfied the academic requirements in respect of Seminar work prescribed for the Bachelor of Engineering Degree. Singnature of Guide Singnature of HOD Signature of Principal Prof`.Sneha B.Kotin Prof`.Sneha B.Kotin Prof`.S . B.Kerur Submitted by Miss.GangaHunasikatti 2LB18EC005
  • 3. DECLARATION I student of 8th semester Bachelor of Engineering in Department of Electronics and Communication Engineering, Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol, affiliated to Visvesvarayya Technological University Belgavi Karnataka, hereby we declare that the dissertation entitled “Honeypot in network security” , Seminar work has been carried out with our project associates at Department of Electronics and Communication Engineering, Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol, and submitted in the partial fulfilment of the requirements for the award of degree of Bachelor of Engineering in Department of Electronics and Communication Engineering by Biluru Gurubasava Mahaswamiji Institute of Technology Mudhol, during the academic year of 2021-22. Further the matter embodied in dissertation has not been submitted by anybody for the award of any degree or diploma to any other university. Place: Mudhol Date: Submitted By Miss. Sunita Sulekar (2LB17EC015)
  • 4. ACKNOWLEDGMENT “SUCCESS IS 1% INSPIRATION AND 99% PERSIPIRATION” and it is this1% of inspiration that enabled us to put in all hard work needed to complete the project. We consider it to be a great privilege to place on record our profound sense of gratitude and sentiments to all those who helped us during the course of project work. First and foremost we would like to thank the Almighty and Our Parents for their continuous encouragement and supporting us to successfully complete our project work. We are highly indebted to our institution Biluru Gurubasava Mahaswamiji Institute of Technology, Mudhol. We have taken efforts in this project. However, it would not have been possible without the kind support and help of many individuals. We would like to extend our sincere thanks to all of them. We wish to thank our Principal Dr. S. B. Kerur for constantly inspiring us in all endeavours and his valuable suggestions during the course of the Seminar. We wish to thank our HOD Prof. Sneha B. Kotin for providing all the support and facilities to make this project a huge success.We do grab this opportunity to express our gratitude to our guide and Seminar coordinator Prof. Jyothi Katagi for his kind support, valuable suggestions and co- operation during this period. His constant motivation enabled us to widen the horizon of our project and interest in this project. Without the cheerful support of teaching and non-teaching staff of our department whose names have not been mentioned, my Seminar would not have seen the light of the day. We would also like to express warm gratitude to all our friends who marked their contributions directly or indirectly inmaking this Seminar a success. Seminar Associated by: Sunita Sulekar 2LB17EC015
  • 5. ABSTRACTION The primary focus of this paper is to demonstrate about the exciting new technology “HONEYPOTS” . In this era of technology, the hectic usage of internet plays a major role in all activities ranging from education to money transactions. In order to undergo all these tasks in a healthy manner we must ensure security in the network we use. Honeypots are the developing technology to secure our networks. Honeypots are typically virtual machines,designed to emulate realmachines, feigning or creating the appearance of running full services and applications,with open ports that might be found on a typical system or server on a network. Honeypots allows the systemadministrators to“trace back” the source of hackers. The main goal of this paper is to give an elaborateexplanation of honeypots, and how they can be deployed to enhance organizational and enterprise security acrosscritical systems and networks. Honeypots can do everything from detecting new attacks to tracking automated creditcard fraud and identity theft. In the past severalyears we have seen the technology rapidly develop, with newconcepts such as honeypot farms,commercial and open source solutions, and documented findings
  • 6. TABLE OF CONTENTS CHAPTERS PAGE NO 1. INTRODUCTION 1.1 Introduction 1.2 History 2. DESCRIPTION 2.1 What is DevOps? 2.2 Why DevOps is needed? 2.3 Why DevOps is Used? 3. DIFFERENCEOF DEVOPS AMONG OTHERS 3.1 Difference between DevOps and traditional IT operations 3.2 Difference between DevOps and Agile 4. DEVOPS 4.1 DevOps Lifecycle 4.2 DevOps Principles 5. DEVOPS TOOLS 6. APPLICATIONS 7. FUTURE OF DEVOPS 8. CONCLUSION 9. REFERENCE
  • 7. CHAPTER 1 INTRODUCTION 1 A honeypot is a trap set to detect deflect or in some manner counteract attempts at unauthorized use of information systems 2 They are the highly flexible security tool with different application security they don’t fix a single problem Instead they have multiple uses such as prevention detection or information gathering 3 a honeypot is an information system resource whose value lies in unauthorized use of the resource
  • 9. CHAPTER 3 LITERATURE SURVEY Title : “E-RTO Management System” Authors : Manjunath S Patil, BasavarajK Madagouda, Vinod C Desai Description: ERTO is an Automation of Road Transport Department through Cellular Network and our ERTO is a step in the era of Mobile computing by using adobe flex and visual studio which will make it easy for RTO [1] professionals to manage and administrate internal office data and also access it on field during enquiry via Mobile applications. Our paper work allows in office data entry professionals not only to key in the data but to also edit, update, delete and print information via Graphical interactive forms and on mobile flash web enabled application. It also enables officers to pay fine which generates fine amount automatically with status such license type, date,paid or unpaid status forms and display vehicle license, registration, emission details on just a click of the button. On the other hand it also provides the on field officials to access data from the Database on server by just using a php based interface by flash enabled mobile application which will fetch data from a server that is physically present on the server with device and location independence. This means that the user with a mere knowledge of operating a mobile can access information at his fingertips within a few seconds without physically visiting or accessing the data from the RTO database server present on server. TITLE : “Cross verification of vehicle and driver for RTO” Authors : Amruta bakale,spoorti awate Description : In this paper author surveyed problem of RTO,RTO employee having lot of work burden of making registration ,license issue, transfer etc.,which requires lots of paper work. As a result people cannot get things done in right time this system helpful for RTO officials to maintain record systematically and reduces lots of paper work and manual effort. In this paper, technique has been discussed for challan system. here user provide details to RTO database. by scanning QR code which contains overall information of the vehicle we getvehicle owner details. This system also detect culprit vehicle. This paper introduces system would make it easier for the public as it becomes an automated process. As the documents no need be carried, it wouldn’t be misplaced and also misused. Hence for the safety of the documents. This system Make one unique identity as a driver license. This system proposes, ”cross verification of driver and license for RTO”,effectively verifies documents related to vehicle and license. This system introduces facility for RTO officials to maintain records systematically and reduces lots of paper work and manual effort . In this paper, we have designed a security system for QR codes. Since QR code security is essential and QR codes are increasingly used in all fields, this system can protect users’ privacy and identity in addition to their smart phone devices. Security system can detect attacks like: QR code fabrication, Phishing and fraud attacks. The proposed secure QR code application provides more security level as well as maintains backward compatibility with QR codes that do not incorporate security features. This paper proposes the optimization of traffic light controller in a city using RFID technology.
  • 10. CHAPTER 4 OBJECTIVES 1. Reduce the traffic police work by obtaining information about the vehicle. 2. User does not need to carry their vehicle document every time. 3. Document expiry alert message is sent to user. 4. It is also provide mutual authentication between the police and users to avoid misusage. 5. This generated QR code is placed in the number plates of the vehicle. 6. The renewalalert is sent to the vehicle owner about payment deadline. 7. The nonpermitted vehicles can be blocked in the check-post by sending the alert messages.
  • 11. CHAPTER 5 METHODOLOGYOF WORK For the implementation of the proposed we required requirements HARDWARE REQUIREMENTS: ➢ System : Pentium IV 2.4 GHz. ➢ Hard Disk : 60 GB. ➢ Monitor : 15 VGA Colour ➢ Ram : 512 Mb. SOFTWARE REQUIREMENTS: ➢ Operating system : Windows XP. ➢ Front End Coding Language : Java , XML,HTML,CSS,JS. ➢ Back End Coding Language : PHP,JSON. ➢ Tool Kit : Android 4.2 (ADT) Admin Module Details
  • 12. 1. Driving License In this module admin can add and update the user driving license as per the user verified documents details. 2. DocumentDetails In this module admin can add and update the user Vehicle Document details as per the user verified documents details . 3. Insurance Details In this module admin can add and update the user vehicle Insurance as per the user verified documents details . 4 EmissionTesting In this module admin can add and update the user vehicle Emission testing as per the user verified documents details . DFT Module Details
  • 15. Proposed system mainly consists of four modules 1. administrator 2. Traffic police 3. Civil police • Driver/Owner: Provide vehicle and personal information to RTO administrator (name, address,license no., mobile no., adhar number, vehicle number, bill of sell etc.) and get QR code and RFID. • RTO administrator: RTO administrator stores all the information related to vehicle and driver and generates QR code and RFID. Also send document expiry alert message to owner when stolen vehicle detected then instantly alert message will be send to police as well as owner of vehicle. • Traffic Police: Scan the QR code or RFID and retrieve vehicle and user information. Also check user past details i.e. how many times he/she violating the traffic rules(like breaking traffic rules), according to that generate fine. • Civil Police : Civil police plays an important role, since a web page will be provided to civil police in order to update the stolen vehicle status to the RTO database
  • 16. CHAPTER 6 APPLICATIONS 1. Driving license Information. 2. Vehicle Information. 3. Insurance Information. 4. Find stolen vehical in easy way suing QR code. 5. Need not to carry hard copy of documents. 6. Data would be stored in encrypted format. 7. More accurate is compared to current method being used.
  • 17. CHAPTER 7 FUTURE SCOPE Road accidents in India take more lives than natural disasters and diseases and these figures are on the rise, with the aim of addressing this problem, we are suggesting some methods like electronic monitoring etc. Electronic monitoring has a provision that the government to ensure proper electronic surveillance on natural and state highways and urban roads. The tracking technology of most people we familiar with the global positioning system, or GPS, satellite technology owned by the U.S government and operated by the air force but now a commercial part of our everyday lives. GPS is used for the purposes ranging from locating lost pets to planning road trips. We can use a live vehicle tracking which helps to find the stolen vehicle and also with the help of this live location tracking we control the traffic and avoiding of traffic blocks are possible by tracking the live location of vehicles and if we use the GPS in every vehicle, then it is easy to navigate, because every navigation system maintains a log of last few places the driver routed. This is a handy feature if you want to return to the same place but can’t remember how you got these. So if we set a GPS tracking in every vehicle, we can make the whole motor vehicle department a smart. Also GPS technology ensures drivers safety by checking driving behavior. A constant tracking keeps theses away from over speeding and brash driving, so with the help of GPS technology, you can identify drivers who exhibits good driving skills and can offer rewards or incentives accordingly. The application can be enhanced with the concept of number plate recognition through image/camera. This paper can enhance the application by linking it to the Aadhar Card database in order to retrieve more details of the license/vehicle owner.
  • 18. CHAPTER 8 CONCLUSION Unique QR code for vehicle verification system is used for solving the real-time problem which takes safe custody of the important documents such as Driving License, PUC,Insurance,RC Book etc. which verify the vehicle documents digitally, so result in much more transparency,authenticity, and also reduce corruption of fake documents and also reduces the administration overhead of RTO Admin by minimizing the use of papers. This application will notify the owner with location when his/her vehicle is undertaken for an inspection which helps the vehicle inspectors to find the stolen vehicles quickly. Vehicle inspectors cannot charge existing fines and bribes more because this application includes all the types of fines and amount to be paid. Owner will get notified at the correct time when the papers are expired, also at the time of app updation and if any fines are charged. Considering the positive aspects of the QR Code, the proposed method is brought into actual practice will definitely prove to be a boon. The proposed project analyses the vehicle document tracking based on QR code. By using our system the driver will goes through the verification process through a reliable and efficient manner by a traffic inspector. QR code is being widely used for implanting messages such that people can easily use their Smartphone's to capture the QR code and gain relevant data from OR code reader. User can get QR code from the RTO administration
  • 19. CHAPTER 9 REFERENCE [1] Ms. Ankita V.Ghodke and Prof. Rahul V.Dagade “Electronic Secure Vehicle Verification system using Advanced Digi-Locker system”, IEEE,2018. [2] Mr. Nilesh R. Patil and Prof. Rajesh Dharmik ,” Secured Cloud Architecture for Cloud Service Provider” IEEE (WCFTR’16) , 2016 [3] N Karale,Kalyani Pendke and Prashant Dahiwale ,” The Survey of Various Techniques & Algorithms for SMS Security Shraddha “ ,IEEE (ICIIECS’15), 2014. [4] Mr. Niteen Surv and Mrs. Jayshree Katti,” Framework for Client Side AES Encryption Technique in Cloud Computing “ , IEEE(IACC),2015, pp .525-528. [5] “Strength of QR Code over Design and Implementation of verification sytem System” Lokesh S. Khedekar and Prajakta S. Kale ,IEEE(ICCSP), 2016, pp .2190-2193. [6] David Lorenzia, Jaideep Vaidya, Soon Chun, Basit Shafiq and Vijayalakshmi Atluri a,” Enhancing the government service experience through QR codes on mobile platforms” ,Elsevier(Journal), 2014, pp .6-16. [7] Wengang Hou , “A Fast Image Encryption Scheme Based on AES Yong Zhang, Xueqian Li “, IEEE(2nd ICIVC),2017, pp .624-628. [8] Eko Sediyono Satya Wacana Suhartono, “Secure Login by Using One-time Password verification sytem Based on MD5 Hash Encrypted SMS “ ,IEEE(Journal), 2013, pp .1604-1608.