FTP Based Honeypot Implementation Model for Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.
Authors and Affiliations
Diksha Dewangan, Amit Kumar Dewangan
Wear Behavior of As – Cast and Heat Treated Al 7075- SiC Composites
In the present investigation, AA 7075 – SiC composites were fabricated using the stir casting method. The wear loss of the composite in the as-cast and heat treated conditions was studied by using pin on disc test by va...
Design of Smart City
Wireless technologies are in style and chop-chop developed throughout few years that are being employed in smart applications like home automation, greenhouse observance, health care and industrial management etc. The i...
Review of Vision Based Robot Navigation System in Dynamic Environment
This paper is proposed for the review of robot navigation in the dynamic environment using vision based approach. Vision-based robot navigation has long been a fundamental goal in both robotics and computer vision resea...
Study of Seed Germination in Sida rhombifolia L.
The present paper deals the effects of seed scarification, temperature, light, salt and osmotic stress, and pH on seed germination, and also the effects of seed burial depth on seedling emergence of Sida rhombifolia. Sc...
Liver Disease Prognosis Based on Clinical Parameters Using Machine Learning Approach
We are living in the era of Machine Learning. The use of Machine Learning in medical diagnosis of various diseases increases many fold in recent years. In this Paper we had made an attempt to demonstrate an analytical a...