ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Efficient Secured System for Identifying Malicious Network Activity Using Scalable Honeypot

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 11)

Publication Date:

Authors : ; ; ; ;

Page : 165-166

Keywords : Network Attack; IDS Evaluation; Honeypot Evaluation; Attack Handling; IDS Rules; Honeypot rules;

Source : Downloadexternal Find it from : Google Scholarexternal


Now a day�s in this world there are many malicious activities performed on internet or network. To prevent these IDS is used but in some cases it fails to capture intrusion. So we are using honeypot to prevent the malicious activity after IDS. Honeypot is system which is used capture the intrusion activity on network. Many organizations exert the honeypot to know the bound of attack on their network. In this paper, we are going to deploy several honeypot to grab the malicious activity. It can be easily exerted in many organizations without specialized hardware and cost effective.

Last modified: 2016-02-12 19:25:02