Detection of threats in Honeynet using Honeywall
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subject to electronic attacks. This led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of Honeypots. A combination of bait and trap to capture the identity of intruder, as the intruder is not physically present is Honeypot. For securing large network we use honeynet which are network of honeypots. In this paper we are going to address the need of a honeywall and how it is used in honeynet environment to trap attackers. Honeywall is a power full tool for capturing attacks in honeynet environment. The information gathering from honeywall would be used in designing an efficient model against malware in computer networks.
Authors and Affiliations
Navita Sharma , Sukhwinder Singh Sran
A COMPARATIVE STUDY OF FUZZY MODELS IN DOCUMENT CLUSTERING
The availability of large quantity of text documents from the World Wide Web and business document management systems has made the dynamic separation of texts into new categories as a very important task for every busine...
Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control
The conventional method of operation of a typical traffic light is to distribute the time equally for all the directions.This method causes congestion when throughput of the signal increases and is also ineffective in ma...
Investigating the performance improvement by sampling techniques in EEG data
In this paper the performance of oversampling methods such as SMOTE (Synthetic Minority Over-sampling Technique) and PCA (Principal Component Analysis) which are used for preprocessing are applied for the Brain computer...
We.I.Pe: Web Identification of People using e-mail ID
With the phenomenal growth of content in the World Wide Web, the diversity of user supplied queries have become vivid. Searching for people on the web has become an important type of search activity in the web search eng...
“An Improved Round Robin Scheduling Algorithm for CPU scheduling”
There are many functions which are provided by operating ystem like process management, memory management, file management, input/output management, networking, protection system and command interpreter ystem. In these...