Using traps to protect network infrastructure from intruders’ attacks

Abstract

The article deals with the peculiarities of using traps to protect network infrastructure from intruders’ attacks, which concern the risks of unauthorized intrusion to a network: attacks on a network, its unauthorized research, etc. It has been clarified that Honeypot trap is flexible information technology, which can be applied to prevent attacks, their detection and answer to them. As a means of protection Honeypot-traps have ability to work effectively in the infrastructure network, while collecting small amount of data, however they are of considerable importance for the owners of network.

Authors and Affiliations

O. Lavrivska, Yu. Grycyuk

Keywords

Related Articles

The analysis of linear systems in basis of Generalized Transformation

The algorithm for analysis of liner systems in basis, which is the class of transformation, which includes Walsh-Hadamard transformation and Discrete Fourier Transform is suggested.

The study of the amplitudes of the fields excited linear grating horn irradiators

The problem of scattering from a linear grating of horns can be solved only with approximate methods because known mathematical methods allow to obtain solutions only for simple mathematical models for example for the en...

Information loss in radial velocity canal

The radial velocity canal work in conditions of information loss is considered and analyzed. Information velocity loss about object’s radial velocity is defined.

Monolithic microwave duplexer

The results of development monolithic dielectric duplexer with the increased attenuation between channels are given, that is achieved asymmetric amplitude-frequency characteristics of the channel filters.

The radar signal simulation based on the analysis of Pulse-Doppler radar for digital signal processing implementation in the Matlab environment

Introduction. The complexity of modern radar (RLS) due to their versatility and the need to adapt to the interference situation is constantly changed. The models to test the basic ideas to be implemented in the radar are...

Download PDF file
  • EP ID EP309105
  • DOI 10.20535/RADAP.2013.55.128-134
  • Views 126
  • Downloads 0

How To Cite

O. Lavrivska, Yu. Grycyuk (2013). Using traps to protect network infrastructure from intruders’ attacks. Вісник НТУУ КПІ. Серія Радіотехніка, Радіоапаратобудування, 0(55), 128-134. https://europub.co.uk/articles/-A-309105