An Approach for Intrusion Detection using HoneyPots to Improve Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike [1]. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.
Authors and Affiliations
Mohd Junedul Haque
A Note on an Upper Bound for (n, d)
In this correspondence, we have to obtain an upper bound for the value of (n,d), we have related to the bounds on the number of code words in a linear code C of length n. In particular we have given the exact inequality...
Performance Analysis of a Self-Activating Solar Tracking Setup
Solar energy is rapidly gaining acclaim and acceptance as an important, efficient and dependable means to substitute conventional energy resources. To make solar energy more viable, the efficiency of solar array systems...
Comparison and Study of Different Image Denoising Techniques
Image denoising is a technique which removes out noise which is added in the original image. Noise reduction is an important part of image processing systems. An image is always affected by noise. Image quality may get...
Increasing Network Lifetime by Using Secure Clustering With Reliable Node Disjoint Multi-path Routing in Wireless Sensor Networks
In order to increase the network latency and resolve the security bottlenecks induced by the camouflaged malicious nodes in Wireless Sensor Networks, the residual energy and trust values are used to form a secured clust...
The Art of Business Relationships Through Social Media
Academic researchers have studied this issue using concepts and techniques such as social capital and social networks analysis. They have provided empirical as well as theoretical evidence of the value generated by diff...