An Efficient Secured System for Identifying Malicious Network Activity Using Scalable Honeypot
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 12)Publication Date: 2016-03-01
Authors : Rahul Patil; Ajinkya Virkud; Swapnil Miniyar; Ajay Sagar;
Page : 165-166
Keywords : Network Attack; IDS Evaluation; Honeypot Evaluation; Attack Handling; IDS Rules; Honeypot rules;
Abstract
Now a day�s in this world there are many malicious activities performed on internet or network. To prevent these IDS is used but in some cases it fails to capture intrusion. So we are using honeypot to prevent the malicious activity after IDS. Honeypot is system which is used capture the intrusion activity on network. Many organizations exert the honeypot to know the bound of attack on their network. In this paper, we are going to deploy several honeypot to grab the malicious activity. It can be easily exerted in many organizations without specialized hardware and cost effective.
Other Latest Articles
- Intrusion Detection System Using Genetic Algorithm : A Survey
- The study of effects of quarry dust on the strength of non-traffic paver block
- Design of Steering System in Race Cars
- A Survey on Subgraph Matching Algorithm for Graph Database
- SmartDigger: A Two-stage Crawler for Efficiently Harvesting Deep-Web
Last modified: 2016-02-15 21:04:30