SECURING WMN USING HONEYPOT TECHNIQUE
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.
Authors and Affiliations
Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta
Position-Based Clustering: An Energy-Efficient Clustering Hierarchy for Heterogeneous Wireless Sensor Networks
A clustering algorithm is a key technique used to increase the scalability and lifetime of the Wireless Sensor Networks (WSNs). In this paper, we propose and evaluate a distributed energy-efficient clustering algorithm f...
FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS
This paper investigates fraudulent and illegal activities that take place through virtual meeting systems. The first section gives an introduction to the problem. Section two describes some cases of fraudulent activity u...
A new similarity measure for image segmentation
We try to extract the component image virtually hidden in the principle image. Information theoretic quantities are used to measure similarity of images in a statistical frame work. Statistical method describes the textu...
An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
A wireless sensor network (WSN) consists of a large number of inexpensive and small nodes with sensing, data processing, and communication capabilities, which are densely deployed in a region of interest and collaborate...
Application of Markov Process Model and Entropy Analysis in Data Classification and Information Retrieval
This paper proposes a statistical approach by a modified arkov chain process model and entropy function in the analysis of a arge data set. The basic idea is that entropy nd conditional ntropy are used to measure the...