FTP Based Honeypot Implementation Model for Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.
Authors and Affiliations
Diksha Dewangan, Amit Kumar Dewangan
Applications of Data Mining Techniques In Health Insurance
Data mining is used to extract patterns in a huge data set. The hidden information can easily be fetched out using the different techniques of data mining. Market Basket Analysis is such a widely used technique which is...
Classification of Brain Tumor using Neural Network
Due to uncontrolled cell devision within the brain abnormal tissue growth will occur this is known as the brain tumor. There are two types of brain tumors that is malignant(cancerous) and benign(non cancerous).Benign tu...
Reliable Automated Telemedicine System Using IOT
It has been always a challenging task for the researchers to incorporate information technology advancement in medical profession. The design and development of wearable biosensor system for health monitoring has garner...
Voice Controlled Home and Industrial Appliances With Additional Wireless Controls
Automation is the main domain now days. Automation for homes, institution, organizations, and industries are highly demanded these days. Our project is a system of software controlled hardware system. In our system the...
Images Fusion Based On Fuzzy Clustering
Image change detection is a process that analyzes images of the same scene taken at different times in order to identify changes that may have occurred between the considered acquisition dates. With the development of r...