An Approach for Intrusion Detection using HoneyPots to Improve Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike [1]. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.
Authors and Affiliations
Mohd Junedul Haque
Design and Development of Automatic Wire Cutting Machine: A Case Study in Small Scale Industry
This Paper gives the detailed information about the design and development of automatic wire cutting machine. At present conventional method is used for wire cutting and measuring which takes more time which requires ma...
A Review on Steganography & Cryptography Techniques
There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and w...
CFD Analysis of Air Cooled Condenser by Using Copper Tubes and Aluminum Fins
In systems involving heat transfer, a condenser is a device or unit used to condense a substance from its gaseous to its liquid state, typically by cooling it. In so doing, the latent heat is given up by the substance,...
Dynamic Illumination Control of Luminaires of Pathways in Large Establishments for Optimized Use of Energy Using BFO Strategy
The paper provides a way of saving energy by smart lighting of a large establishment using BFO strategy for switching, illumination and dimming control via Wi-Fi communication network. The switching and dimming occurs a...
Image Piracy Alert System in Social Networks Using Watermarking
In this digital age one’s content is growing in social networking sites. A novel technique has been proposed in this article to address this threat by using bit plane digital watermarking technique. A QR code representi...