Intrusion Detection in Network using HoneyPOT Technology
نویسندگان
چکیده
منابع مشابه
Intrusion Detection System Using Shadow Honeypot
The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...
متن کاملA Dynamic Honeypot Design for Intrusion Detection
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhatcommunity), thus deriving their value from the unauthorized use of their resources. This paper discusses ...
متن کاملA Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...
متن کاملIncorporating Honeypot for Intrusion Detection in Cloud Infrastructure
Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Tradit...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.4307