Detection of threats in Honeynet using Honeywall
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subject to electronic attacks. This led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of Honeypots. A combination of bait and trap to capture the identity of intruder, as the intruder is not physically present is Honeypot. For securing large network we use honeynet which are network of honeypots. In this paper we are going to address the need of a honeywall and how it is used in honeynet environment to trap attackers. Honeywall is a power full tool for capturing attacks in honeynet environment. The information gathering from honeywall would be used in designing an efficient model against malware in computer networks.
Authors and Affiliations
Navita Sharma , Sukhwinder Singh Sran
Gesture Based Educational Software for Children with Acquired Brain Injuries
"GESBIā is gesture based audio visual teaching tool designed to help children with acquired brain injuries, providing hours of entertainment in a play-and-learn environment while ntroducing the foundation skills in basic...
Flood Frequency Analysis Using the Gumbel Distribution
This paper presents results of a study carried in Zimbabwe aimed at analysing the frequency of Nyanyadzi River floods using the Gumbel distribution. Extreme floods over recent years had washed away fields, destroyed infr...
Co-Recursively Enumerable Triods with Computable Endpoints
Recursive sets in the Euclidean space are those sets which an be effectively approximated by finitely many points for an arbitrary given precision. On the other hand, co-recursively enumerable sets are those sets whose...
Ant Colony Optimization approach for Solving FPGA routing with minimum Channel Width
In this paper ANT colony optimization algorithm has been proposed to solve FPGA routing in FPGA design architecture with minimum umbers of tracks per channel. In our method geometric FPGA routing task is transformed into...
Model based approach for Detection of Architectural Distortions and Spiculated Masses in Mammograms
This paper investigates detection of Architectural Distortions (AD) and spiculated masses in mammograms based on their physical characteristics. We have followed a model based approach which separates the abnormal patter...