• Corpus ID: 15143811

Comparison of network security tools- Firewall, Intrusion Detection System and Honeypot

  title={Comparison of network security tools- Firewall, Intrusion Detection System and Honeypot},
  author={Tejvir Kaur and Vimmi Malhotra and Dheerendra Singh},
With the advent of Internet, personal computers and computer networks are becoming increasingly vulnerable to various kinds of attacks. Information has become like an asset that needs to be protected from attacks. Due to attack privacy can be violated and important data can be lost. The attacks are usually caused by a failure to implement security policies and failure of using of security tools that are readily available. The various security tools that are available are Firewall, Intrusion… 

Figures from this paper

Implementation of honeypot to detect and prevent distributed denial of service attack
  • I. Sembiring
  • Computer Science
    2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)
  • 2016
Based on the research, honeypot is successfully giving responds to Distributed Denial of Service (DDoS) attacks and giving false information such as operation system and open ports which are usually sought by attackers.
An Analysis of Honeypot Programs and the Attack Data Collected
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or compromised. While the attacker is distracted with the decoy computer system we learn about the
New approach to detect suspicious activity using HTTP-proxy honeypots
  • R. E. Mushtakov, D. Silnov
  • Computer Science
    2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
  • 2017
The research provides the version of Honeypot implementation based on proxy-server based on emulation of intruder detection system and analysis of potential violator behavior.
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
The current research investigated the effectiveness of the use of centralized system management technologies called Puppet and Virtual Machines in the implementation of automated honeypots for intrusion detection, correction and prevention.
Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
In this paper, intrusion detection system (IDS) is proposed to identify and distinguish the incoming traffic from the clients and traffic originating through the attackers by using the honeypot security mechanism.
Investigation of modern attacks using proxy honeypot
Implementation of the honeypot based on the open proxy server allows to log all activity on the investigated proxy and classification of malicious users and the statistics of the attacks' sources are provided.
Honeyconf: Automated Script for generating Honeyd Configuration to Detect Intruders
Honeyd is a daemon framework for virtual honeypots that defend the files from intruder or illicit users with in a network through automated script which generates for honeyd.
A Study on Firewall System, Scheduling and Routing using pfsense Scheme
  • P. Senthilkumar, M. Muthukumar
  • Computer Science
    2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)
  • 2018
A Similarity Index Algorithm is proposed which is to detect the malignant packets in the firewall framework and shows latency and malignant packet detection rate of the proposed firewall architecture is 14.74 ms and 87%, respectively.
The design of Remote Iptables and Intrusion Detection System (IDS) system with Snort has been done, warning system of real-time attacks will be sent via SMS, a number of syntax with iptables remote using SMS Gateway, and blocking in real time.
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
This paper mainly focuses on honeypot mechanism, a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems.


Understanding Intrusion Detection Systems
Intrusion detection systems are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems, and can detect attempts to compromise the confidentiality, integrity, and availability of a computer or network.
Intrusion prevention system design
The characters of the IPS are introduced, a distributed IPS: IPS design based on SNMP is put forward, and the function and implementation of each part of IPS is explained in detail.
The Generation of Attack Signatures Based on Virtual Honeypots
  • Xinyu Tang
  • Computer Science
    2010 International Conference on Parallel and Distributed Computing, Applications and Technologies
  • 2010
This paper puts forward an automatically generated system of attack signature based on virtual honey pots, which adopts an open source software virtual honey pot¿Honeyd, uses the plug-in-supporting
Guide to Intrusion Detection and Prevention Systems (IDPS)
The characteristics of IDPS technologies are described and recommendations for designing, implementing, configuring, securing, monitoring, and maintaining them are provided.
The use of Honeynets to detect exploited systems across large enterprise networks
This work proposes that a Honeynet can be used to assist the system administrator in identifying malicious traffic within the enterprise network.
Improve the network performance by using parallel firewalls
An overview of networkFirewalls, its importance, and different types of network firewalls is provided, studying the effect of implementing the firewall on the network performance and how using parallelFirewall is improved.
A Virtual Honeypot Framework
Honeyd is presented, a framework for virtual honeypots that simulates virtual computer systems at the network level and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.
Fundamentals of Network Security
This book discusses Encryption on the WWW - The World Wide Web, Biometrics, Biometric Identification and Authentication, and Developing Security Policies, which focuses on the latter part of the 1990s.
Cryptography and Network Security: Principles and Practice
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In
Implementing a distributed firewall
This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.