ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INTEGRATED HONEYPOT

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)

Publication Date:

Authors : ; ; ; ;

Page : 23-30

Keywords : computer engineering; iaeme journals; iaeme publication; research; IJCET; research article; research paper; open access journals; international journals publisher; journal impact factor;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The primary goal of computer security is to defend computers against attacks launched by malicious use rs. There are a number of ways in which researchers and developers can work to protect the network they us e; one class of these tools are honeypots. A honeypot is a computer which has been configured to some extent to seem normal to an attacker, but actually logs and observes what the attacker does. Here in this paper I am presenting the integrated honeypot that can generate attack signatures against the Zero Day Attack, SSH Attack, Keylogger-Spyware Attack. During this assessment it was shown that honeypot is a very effective tool in gathering vital information about the above mentioned attacks. The prevention of these attacks are necessary. In this paper I propose an architecture for detecting and preventing the different behaviors of network attacks.

Last modified: 2016-08-05 15:51:24