Securing Wmn Using Hybrid Honeypot System
نویسندگان
چکیده
منابع مشابه
Securing Wmn Using Hybrid Honeypot System
Wireless Mesh Network (WMN) has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probe...
متن کاملSecuring Wmn Using Honeypot Technique
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromis...
متن کاملHybrid Solution in Honeypot Mechanism using Hadoop
Achieving computer system security is one of the most popular and fastest Information Technology in organization. System security personnel fight a seemingly unending battle to secure their digital assets against an ever increasing onslaught of attacks. Protection of information availability, its access and data integrity are the basic security characteristics of information sources. Any disrup...
متن کاملA proposal for securing a large-scale high-interaction honeypot
This paper presents the design of a secured highinteraction honeypot. The challenge is to have a honeypot that welcomes attackers, allows userland malicious activities but prevents from system corruption. The honeypot must be scalable to authorize a large amount of malicious activities and to analyze those activities efficiently. The hardening of the honeypot is proposed for two kinds of host. ...
متن کاملIntrusion Detection System Using Shadow Honeypot
The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed and Parallel systems
سال: 2012
ISSN: 2229-3957
DOI: 10.5121/ijdps.2012.3304