Honeypot based Secure Network System
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different events. Before deploying a honeypot it is advisable to have a clear idea of what the honeypot should and should not do. There should be clear understanding of the operating systems to be used and services (like a web server, ftp server etc) a honeypot will run. The risks involved should be taken into consideration and methods to tackle or reduce these risks should be understood. It is also advisable to have a plan on what to do should the honeypot be compromised. In case of production honeypots, a honeypot policy addressing security issues should be documented. Any legal issues with respect to the honeypots or their functioning should also be taken into consideration. In this paper we explain the relatively new concept of “honeypot.” Honeypots are a computer specifically designed to help learn the motives, skills and techniques of the hacker community and also describes in depth the concepts of honeypots and their contribution to the field of network security. The paper then proposes and designs an intrusion detection tool based on some of the existing intrusion detection techniques and the concept of honeypots.
Authors and Affiliations
Yogendra Kumar Jain , Surabhi Singh
Effective Term Based Text Clustering Algorithms
Text clustering methods can be used to group large sets of text documents. Most of the text clustering methods do not address the problems of text clustering such as very high dimensionality of the data and understandabi...
Schedule Risk Analysis Simulator using Beta Distribution
This paper describes an application of simulation and Modelling in Software risk management. This paper describes a simulation based software risk management tool which helps manager to identify high risk areas of softwa...
A Review on sensor based communication kit for impaired society
A gesture is used to classify and recognize a signal that enables communication among the impaired community. It is a technique that has been in use to make people feel comfortable just like the normal people behave. In...
Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk
Vigenere cipher is a polyalphabetic substitution cipher with a very large key space. In this paper we have investigated the use of PSO for the cryptanalysis of vigenere cipher and proposed PSO with Markov chain random wa...
SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
With the availability of the Internet, virtual communities are proliferating at an unprecedented rate. Indepth understanding of virtual community dynamics can help us to address critical organizational and information sy...