INTEGRATED HONEYPOT
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)Publication Date: 2014-12-29
Authors : ANSONA N; S.SASIDHAR BABU; SHEEMA M; P.JAYAKUMAR;
Page : 23-30
Keywords : computer engineering; iaeme journals; iaeme publication; research; IJCET; research article; research paper; open access journals; international journals publisher; journal impact factor;
Abstract
The primary goal of computer security is to defend computers against attacks launched by malicious use rs. There are a number of ways in which researchers and developers can work to protect the network they us e; one class of these tools are honeypots. A honeypot is a computer which has been configured to some extent to seem normal to an attacker, but actually logs and observes what the attacker does. Here in this paper I am presenting the integrated honeypot that can generate attack signatures against the Zero Day Attack, SSH Attack, Keylogger-Spyware Attack. During this assessment it was shown that honeypot is a very effective tool in gathering vital information about the above mentioned attacks. The prevention of these attacks are necessary. In this paper I propose an architecture for detecting and preventing the different behaviors of network attacks.
Other Latest Articles
- A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS
- A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS
- Language portfolio of foreign language teacher as means of self-regulation of professional growth
- Improving the research culture of history teacher: theoretical and methodological aspects
- Training of PEI teachers for pedagogical support of social development of preschool age child
Last modified: 2016-08-05 15:51:24