Detection of threats in Honeynet using Honeywall
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subject to electronic attacks. This led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of Honeypots. A combination of bait and trap to capture the identity of intruder, as the intruder is not physically present is Honeypot. For securing large network we use honeynet which are network of honeypots. In this paper we are going to address the need of a honeywall and how it is used in honeynet environment to trap attackers. Honeywall is a power full tool for capturing attacks in honeynet environment. The information gathering from honeywall would be used in designing an efficient model against malware in computer networks.
Authors and Affiliations
Navita Sharma , Sukhwinder Singh Sran
A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms
Abstract--The paper deals with the concepts of expert system and data mining belongs to the Artificial Intelligence fields. The main task of expert system is to ratiocination, while the machine learning algorithm is to f...
PARALLELS BETWEEN GLUCONEOGENESIS AND SYNCHRONOUS MACHINES
Biological diversity particularly at molecular level is astounding and can be used for rational manipulation of biological organisms. To analyze molecular diversity in its full scope computational models of biological or...
Effect of Quality Parameters on Energy Efficient Routing Protocols in MANETs
This paper presents a survey on energy efficient routing protocols for wireless Ad-Hoc networks. Survey focus on recent development and modifications in this widely used field. In this paper I present a number of ways of...
Adaption of Proactive Measure for Improving Performance Throughput Of TCP-Vegas
TCP (Transmission Control Protocol) throughput considered to be one of the most important aspects for analyzing the performance of TCP. This article represents a novel proactive technique based Acknowledge Delay which ai...
Service Composition in Service Oriented Product Line
The paradigm of Service Oriented Architecture (SOA) and Software Product Line Engineering (SPLE) discipline facilitate the development of families of software-intensive products. Software Product Line practices can be le...