Detection of threats in Honeynet using Honeywall

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10

Abstract

Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subject to electronic attacks. This led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of Honeypots. A combination of bait and trap to capture the identity of intruder, as the intruder is not physically present is Honeypot. For securing large network we use honeynet which are network of honeypots. In this paper we are going to address the need of a honeywall and how it is used in honeynet environment to trap attackers. Honeywall is a power full tool for capturing attacks in honeynet environment. The information gathering from honeywall would be used in designing an efficient model against malware in computer networks.

Authors and Affiliations

Navita Sharma , Sukhwinder Singh Sran

Keywords

Related Articles

A COMPARATIVE STUDY OF FUZZY MODELS IN DOCUMENT CLUSTERING

The availability of large quantity of text documents from the World Wide Web and business document management systems has made the dynamic separation of texts into new categories as a very important task for every busine...

Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control

The conventional method of operation of a typical traffic light is to distribute the time equally for all the directions.This method causes congestion when throughput of the signal increases and is also ineffective in ma...

Investigating the performance improvement by sampling techniques in EEG data

In this paper the performance of oversampling methods such as SMOTE (Synthetic Minority Over-sampling Technique) and PCA (Principal Component Analysis) which are used for preprocessing are applied for the Brain computer...

We.I.Pe: Web Identification of People using e-mail ID

With the phenomenal growth of content in the World Wide Web, the diversity of user supplied queries have become vivid. Searching for people on the web has become an important type of search activity in the web search eng...

“An Improved Round Robin Scheduling Algorithm for CPU scheduling”

There are many functions which are provided by operating ystem like process management, memory management, file management, input/output management, networking, protection system and command interpreter ystem. In these...

Download PDF file
  • EP ID EP113807
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

Navita Sharma, Sukhwinder Singh Sran (2011). Detection of threats in Honeynet using Honeywall. International Journal on Computer Science and Engineering, 3(10), 3332-3336. https://europub.co.uk/articles/-A-113807