• Corpus ID: 14659615

Honeypot based Secure Network System

@inproceedings{Jain2011HoneypotBS,
  title={Honeypot based Secure Network System},
  author={Yogendra Kumar Jain},
  year={2011}
}
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large… 

Figures from this paper

HONEYPOTS IN NETWORK SECURITY

TLDR
The focus of this report is primarily on preventing the attacks from external and internal attackers and maintaining the log file using honeypot with virtual machine.

Implementation of honeypot to detect and prevent distributed denial of service attack

  • I. Sembiring
  • Computer Science
    2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)
  • 2016
TLDR
Based on the research, honeypot is successfully giving responds to Distributed Denial of Service (DDoS) attacks and giving false information such as operation system and open ports which are usually sought by attackers.

Implementation on Honeyd: A system for analysis of network attacks

TLDR
Feature capturing, logging and analysis into the proposed system will enable security expert to investigate such events even more sophisticatedly and to secure the server in network.

A Review on Recent Advances & Future Trends of Security in Honeypot

TLDR
Honeypot model is proposed for honeypot to take care of the issue of little scale enterprises which is the half and half structure of Snort, Nmap, Xprobe2, and P0f, and virtualization is performed with the assistance of virtual machine.

SECURING WMN USING HYBRID HONEYPOT SYSTEM

TLDR
A honeynet is proposed, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.

SECURING WMN USING HONEYPOT TECHNIQUE

TLDR
An attack detection approach for wireless mesh network using Honeypot technique that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.

A Network Defense System For Detecting And Preventing Potential Hacking Attempts

TLDR
Feature capturing, logging and analysis into the proposed system will enable security expert to investigate such events even more sophisticatedly and to secure the server in network.

A radical approach to secure LAN network using novel hardening techniques

TLDR
A new model is proposed for LAN hardening to reduce security risk and main focus is to secure client/server and concept of masking is introduced to protect user system and to create illusion for intruders.

INTRUSION DETECTION& PREVENTION USING HONEYPOT

  • Vivekanand Rajbhar
  • Computer Science
    International Journal of Advanced Research in Computer Science
  • 2018
TLDR
New framework & methodology is proposed that implements IDS & IPS within the honeypot with real time network packet capturing & intrusions detection along with embedded firewall for intrusion prevention, which make the proposed honeypot more effective and efficient than existing honeypots.

Ant-based distributed denial of service detection technique using roaming virtual honeypots

TLDR
In this technique, virtual roaming honeypot along with the multi-level secure architecture is used to collect the information about the various intruders at different levels in the network to make a defence system against the attackers.

References

SHOWING 1-10 OF 13 REFERENCES

Design and implementation of honeypot systems based on open-source software

TLDR
The purpose of this study is to use the open-source tool Honeyd to construct a graphic user interface (GUI) for honeyd and present an analytic result of a 60-day period with a Web-based data analysis system.

Research on network security of defense based on Honeypot

  • Jian BaoC. JiMo Gao
  • Computer Science
    2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
  • 2010
TLDR
Honeypot technology can proactively detect and respond to the intrusion and the attack of the network, and has the feature of using simply, configurations flexibly, occupying less resource, and working effectively in a complex environment.

Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level

  • A. SardanaR. Joshi
  • Computer Science
    2008 International Symposiums on Information Processing
  • 2008
TLDR
This work proposes the automatic generation of adequate server nodes to service client requests and honeypots to interact with attackers in contained manner and validate the effectiveness of the approach with modeling on Internet type topology and simulation in ns-2 on a Linux platform.

Design and implementation of distributed intrusion detection system based on honeypot

  • Yun YangJia Mi
  • Computer Science
    2010 2nd International Conference on Computer Engineering and Technology
  • 2010
TLDR
Experiments result show that this distributed intrusion detection system based on honeypot can better detect intrusion and improve the overall safety performance of large-scale networks.

Collecting Internet Malware Based on Client-side Honeypot

TLDR
An Internet malware collecting system based on client-side honeypot that can not only collect malware but also detect malicious Web site and give the results.

Honeyware: A Web-Based Low Interaction Client Honeypot

  • Yaser AloseferO. Rana
  • Computer Science
    2010 Third International Conference on Software Testing, Verification, and Validation Workshops
  • 2010
TLDR
This paper will present the idea of using web-based technology and integrating it with a client honeypot by building a low interaction client honey Pot tool called Honeyware, and describes the benefits of Honeyware as well as the challenges of the low interaction Client honeypot and some ideas for how these challenges could be overcome.

The use of honeypot approach in software-based application protection for shareware programs

TLDR
A honeypot approach that can be implemented without significant effort, aimed at prolonging the time taken to fully circumvent the protection is proposed and tested and has the following properties - appears to be easily defeated, is unpredictable and stealthy, and is a machine-dependent algorithm.

Research of wireless intrusion prevention systems based on plan recognition and honeypot

TLDR
Experimental results showed that the plan recognition and pre-decision engine can not only improve detection and prevention performance but also reduce false positives evidently.

A Multi-agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot

TLDR
A new architecture, which is composed of distributed cooperative agents to reduce the false alarm ratio of the intrusion detection systems (IDS) in a twofold contribution by using honeypot network as the closer level of investigation.

Research on Honeypot Information Fusion Based on Game Theory

TLDR
The paper regarded the fusion process of honeypot information as game process among information, so as to integrate theory game theory and information fusion, then the optimal security decision can be arrived.