SECURING WMN USING HONEYPOT TECHNIQUE

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.

Authors and Affiliations

Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta

Keywords

Related Articles

New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher

Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and cha...

Cost Analysis of a Three Layered MIPv6 (TLMIPv6) Mobility Model and HMIPv6

In this paper cost analysis of a three-layer hierarchical model and HMIPv6 is done. The objective of this work is to examine the signaling cost, tunneling cost and packet dropping probability at top level anchor agents o...

Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the task of...

A Face Recognition System Through Somatology

Normally facial recognition algorithms identify faces by extracting landmarks or features from an image of the subject’s face and then algorithm may analyze the relative size, shape of the eyes, nose, cheekbones, and jaw...

Multithreaded Implementation of Hybrid String Matching Algorithm

Reading and taking reference from many books and articles, and then analyzing the Navies algorithm, Boyer Moore algorithm and Knuth Morris Pratt (KMP) algorithm and a variety of improved algorithms, summarizes various ad...

Download PDF file
  • EP ID EP155870
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

Priyanka Gupta, Paramjeet Rawat, Suraj Malik, Sudhanshu Gupta (2012). SECURING WMN USING HONEYPOT TECHNIQUE. International Journal on Computer Science and Engineering, 4(2), 235-238. https://europub.co.uk/articles/-A-155870