Intrusion Detection System Using Advanced Honeypots

@article{Singh2009IntrusionDS,
  title={Intrusion Detection System Using Advanced Honeypots},
  author={Ram Kumar Singh and T. Ramajujam},
  journal={CoRR},
  year={2009},
  volume={abs/0906.5031}
}
As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions[2]. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator. Hence implementation… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Stalking the Wily Hacker

Commun. ACM • 1988
View 3 Excerpts
Highly Influenced

Build a PC Honeypot

J. Kinsella
Retrieved November • 2005

Decrets and Lies: Digital Security in a Networked World

Bruce Schnier
Wiley Publications, • 2005

Towards a third generation data capture architecture for honeynets

Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop • 2005

Honeypots Revealed. Retrieved November 5, 2005, from Security Docs.com Website: http://www.securitydocs.com/library/2692

M. Noordin
2004

Probabilistic Alert Correlation

Recent Advances in Intrusion Detection • 2001

Similar Papers

Loading similar papers…