SECURING WMN USING HONEYPOT TECHNIQUE

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.

Authors and Affiliations

Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta

Keywords

Related Articles

MATLAB Simulation of Fuzzy Traffic Controller for Multilane Isolated Intersection

This paper presents a MATLAB simulation of fuzzy traffic ontroller for controlling traffic flow at multilane isolated ignalized intersection. The controller is developed based on the waiting time and vehicles queue le...

An Approach to Automatic Generation of Test Cases Based on Use Cases in the Requirements Phase

The main aim of this paper is to generate test cases from the use cases. In the real-time scenario we have to face several issues like inaccuracy, ambiguity, and incompleteness in requirements this is because the require...

Color Image Segmentation for Satallite Images

This paper introduces efficient and fast algorithms for unsupervised image segmentation, using low-level features such as color, applied on satellite images. With the increase in spatial resolution of satellite imagery,...

Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator

Computer systems are prone to failures. Failures are caused by faults that occur in a system. As faults are unknown and cannot be measured, they produce error messages on their detection. The approach presented here is t...

Next Generation High Speed Computing Using Photonic Based Technology

In the present era of technology computer has facilitated the human life up to a great extent. The speed of computation has raised to astonish level but the pace of development of other technologies which have core depen...

Download PDF file
  • EP ID EP155870
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Priyanka Gupta, Paramjeet Rawat, Suraj Malik, Sudhanshu Gupta (2012). SECURING WMN USING HONEYPOT TECHNIQUE. International Journal on Computer Science and Engineering, 4(2), 235-238. https://europub.co.uk/articles/-A-155870