An Approach for Intrusion Detection using HoneyPots to Improve Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike [1]. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running on the system by hacker. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is great way to improve network security administrators’ knowledge and learn how to get information from a victim system using forensic tools. Honeypot is also very useful for future threats to keep track of new technology attacks.
Authors and Affiliations
Mohd Junedul Haque
Design of High Pass FIR Filter using Rectangular and Taylor Window Method
In this paper a window function has been defined and simulated. In the initial section the frequency response of the four basic types of FIR filter have been simulated using the window function. Then the fir filter resp...
Evaluation of Critical Success Factor in Construction Industry
The maіn objectіve of project management іs to ascertaіn success of the construction project and identification of the paramount factors whіch play a vіtal role іn the prosperіty of the project. However, to identify the...
Implementation of an Efficient Way of Broadcasting Response Message to Help Demanding Vehicle in VANET
VANET is very demanding area of research in these days. In this paper, we identify that when an emergency condition occurred at any location on the road, then emergency support take time to reach emergency location due...
slugAutomatic Segmentation of Intima-Media Complex
The intima media thickness (IMT) is considered as an important marker for the evaluation of the risk in the development of atherosclerosis. The evaluation of the IMT is carried out on B - mode ultra...
Case Study Of "Neera Devdhar" Canal Seepage Losses and Canal Lining
In india canal irrigation is a major source of artificial irrigation. Many canals are unlined and due to that major seepage is found in unlined canal.50 to 60 % seepage is found in unlined canal. Concrete, shortcrete, s...