Securing Wmn Using Hybrid Honeypot System

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Wmn Using Hybrid Honeypot System

Wireless Mesh Network (WMN) has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probe...

متن کامل

Securing Wmn Using Honeypot Technique

WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromis...

متن کامل

Hybrid Solution in Honeypot Mechanism using Hadoop

Achieving computer system security is one of the most popular and fastest Information Technology in organization. System security personnel fight a seemingly unending battle to secure their digital assets against an ever increasing onslaught of attacks. Protection of information availability, its access and data integrity are the basic security characteristics of information sources. Any disrup...

متن کامل

A proposal for securing a large-scale high-interaction honeypot

This paper presents the design of a secured highinteraction honeypot. The challenge is to have a honeypot that welcomes attackers, allows userland malicious activities but prevents from system corruption. The honeypot must be scalable to authorize a large amount of malicious activities and to analyze those activities efficiently. The hardening of the honeypot is proposed for two kinds of host. ...

متن کامل

Intrusion Detection System Using Shadow Honeypot

The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed and Parallel systems

سال: 2012

ISSN: 2229-3957

DOI: 10.5121/ijdps.2012.3304