Corpus ID: 14659615

Honeypot based Secure Network System

@inproceedings{Jain2011HoneypotBS,
  title={Honeypot based Secure Network System},
  author={Y. K. Jain},
  year={2011}
}
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large… Expand

Figures from this paper

HONEYPOTS IN NETWORK SECURITY
Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It isExpand
Implementation of honeypot to detect and prevent distributed denial of service attack
  • I. Sembiring
  • Computer Science
  • 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)
  • 2016
TLDR
Based on the research, honeypot is successfully giving responds to Distributed Denial of Service (DDoS) attacks and giving false information such as operation system and open ports which are usually sought by attackers. Expand
Implementation on Honeyd: A system for analysis of network attacks
Various attacks today are used by attackers to compromise the network security these days. These exploits of attacks are capable of exploiting into any secure networks. So to secure the server inExpand
A Review on Recent Advances & Future Trends of Security in Honeypot
PC Network and Internet is developing each day. PC systems permit conveying speedier than whatever other offices. These systems permit the client to get to neighborhood and remote databases. It isExpand
SECURING WMN USING HYBRID HONEYPOT SYSTEM
TLDR
A honeynet is proposed, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking. Expand
SECURING WMN USING HONEYPOT TECHNIQUE
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusionExpand
A Network Defense System For Detecting And Preventing Potential Hacking Attempts
ARTICLE INFO Various attacks today are used by attackers to compromise the network security these days. These exploits of attacks are capable of exploiting into any secure networks. So to secure theExpand
A radical approach to secure LAN network using novel hardening techniques
Computer Networks and Internet has grown vastly in past decade. Computer Networks allows access to information and services in an organized as well as controlled manner. Security is needed to makeExpand
Automated multilevel defence model to investigate packets for web interface
  • S. Verma, Tanya Singh
  • Computer Science
  • 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)
  • 2012
TLDR
An automated multilevel defence Intrusion Response Model which would filter the packets in the first stage, look for the malicious data hidden in the second stage, investigate packets for securing web server using client honeypot in the third stage and analyse the data stored in the repository of the client honeypots in the fourth stage is developed. Expand
A Distributed Malicious Attack Detection and Prevention Approach Using Honeypots in Ad-hoc Networks
Malicious attacks on computer networks has become a serious concern in the world of information technology. Various malware protection softwares and programs are specifically developed to combatExpand
...
1
2
3
...

References

SHOWING 1-10 OF 13 REFERENCES
Design and implementation of honeypot systems based on open-source software
TLDR
The purpose of this study is to use the open-source tool Honeyd to construct a graphic user interface (GUI) for honeyd and present an analytic result of a 60-day period with a Web-based data analysis system. Expand
Research on network security of defense based on Honeypot
  • Jian Bao, C. Ji, Mo Gao
  • Engineering
  • 2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
  • 2010
With the development of the network attack technique, the increase of the security risk on the internet, each host in the network may be the target of the attack. Honeypot technology can proactivelyExpand
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level
  • A. Sardana, R. Joshi
  • Computer Science
  • 2008 International Symposiums on Information Processing
  • 2008
TLDR
This work proposes the automatic generation of adequate server nodes to service client requests and honeypots to interact with attackers in contained manner and validate the effectiveness of the approach with modeling on Internet type topology and simulation in ns-2 on a Linux platform. Expand
Design and implementation of distributed intrusion detection system based on honeypot
  • Yun Yang, Jia Mi
  • Computer Science
  • 2010 2nd International Conference on Computer Engineering and Technology
  • 2010
TLDR
Experiments result show that this distributed intrusion detection system based on honeypot can better detect intrusion and improve the overall safety performance of large-scale networks. Expand
Collecting Internet Malware Based on Client-side Honeypot
TLDR
An Internet malware collecting system based on client-side honeypot that can not only collect malware but also detect malicious Web site and give the results. Expand
Honeyware: A Web-Based Low Interaction Client Honeypot
  • Yaser Alosefer, O. Rana
  • Computer Science
  • 2010 Third International Conference on Software Testing, Verification, and Validation Workshops
  • 2010
TLDR
This paper will present the idea of using web-based technology and integrating it with a client honeypot by building a low interaction client honey Pot tool called Honeyware, and describes the benefits of Honeyware as well as the challenges of the low interaction Client honeypot and some ideas for how these challenges could be overcome. Expand
The use of honeypot approach in software-based application protection for shareware programs
TLDR
A honeypot approach that can be implemented without significant effort, aimed at prolonging the time taken to fully circumvent the protection is proposed and tested and has the following properties - appears to be easily defeated, is unpredictable and stealthy, and is a machine-dependent algorithm. Expand
Research of wireless intrusion prevention systems based on plan recognition and honeypot
TLDR
Experimental results showed that the plan recognition and pre-decision engine can not only improve detection and prevention performance but also reduce false positives evidently. Expand
A Multi-agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot
TLDR
A new architecture, which is composed of distributed cooperative agents to reduce the false alarm ratio of the intrusion detection systems (IDS) in a twofold contribution by using honeypot network as the closer level of investigation. Expand
Research on Honeypot Information Fusion Based on Game Theory
TLDR
The paper regarded the fusion process of honeypot information as game process among information, so as to integrate theory game theory and information fusion, then the optimal security decision can be arrived. Expand
...
1
2
...