FTP Based Honeypot Implementation Model for Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.
Authors and Affiliations
Diksha Dewangan, Amit Kumar Dewangan
Influence of Parental Education Among their Wards on Vocational Skill Development
Many students are good in their studies even though their parents are illerrate.we cannot argue that only the educated parents can provide a good education for their children. Whereas the well-educated parents are more...
Wireless Electronic Notice Board Using Raspberry Pi 3
Notice boards can change the way communication with each other, using notice boards is a constructive method of promoting important information to a large number of people. Notice board is ideally useful tool for organi...
Palm Authentication:A Review
A system which is basically used for pattern detection and identification on the bases of physical and behavioral traits is known as biometric system. Biometric recognition has been investigated over the past many years...
Electrical Generation by using Vertical Axis Wind Turbine
Wind power capacity has experienced tremendous growth in the past decade. There are many loads (such as remote villages, islands, ships etc.) that are away from the main grid. Energy demand continues to grow, year after...
Proposed & Implemented Clustering Algorithm for Indexing in Search Engine
This paper proposes clustering algorithm for implementing indexing phase of search engine. The goal of making an index is to optimize speed and performance in finding relevant documents for a search query. Without an in...