SECURING WMN USING HONEYPOT TECHNIQUE
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.
Authors and Affiliations
Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta
MATLAB Simulation of Fuzzy Traffic Controller for Multilane Isolated Intersection
This paper presents a MATLAB simulation of fuzzy traffic ontroller for controlling traffic flow at multilane isolated ignalized intersection. The controller is developed based on the waiting time and vehicles queue le...
An Approach to Automatic Generation of Test Cases Based on Use Cases in the Requirements Phase
The main aim of this paper is to generate test cases from the use cases. In the real-time scenario we have to face several issues like inaccuracy, ambiguity, and incompleteness in requirements this is because the require...
Color Image Segmentation for Satallite Images
This paper introduces efficient and fast algorithms for unsupervised image segmentation, using low-level features such as color, applied on satellite images. With the increase in spatial resolution of satellite imagery,...
Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator
Computer systems are prone to failures. Failures are caused by faults that occur in a system. As faults are unknown and cannot be measured, they produce error messages on their detection. The approach presented here is t...
Next Generation High Speed Computing Using Photonic Based Technology
In the present era of technology computer has facilitated the human life up to a great extent. The speed of computation has raised to astonish level but the pace of development of other technologies which have core depen...