Spark-Based Network Security Honeypot System: Detailed Performance Analysis

نویسندگان

چکیده

In the contemporary world, network security has been of biggest importance and acute worry in both individual institutional wisdom, concurrent with newly emerging technologies. Firewalls, encryption techniques, intrusion detection systems, honeypots are just a few systems technologies that have developed to ensure information security. Systems for safeguarding an organizational environment through various defensive strategies traditionally developed. "The enemy continues on attacking" is primarily statement. By empowering organization take action, Honeypot demonstrates its importance. An institution can discover, gather, address, absorb new policy flaws aid honeypots. This methodology allows organization's measures continuously incorporate threats penetration methods. main justification creating, developing, using honeypot. It resource meant be taken advantage compromised. To evaluate methodology, spark-based honeypot strategy designed, put into practice, tested this study. The suggested study undergone many days testing campus-based network. designed system's primary function behave as fully resourced computer or vault draw intruders requirement they not defend against respond intrusions. studies were carried out number parameters designed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Security Enhancement through Honeypot based Systems

Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its ow...

متن کامل

Honeypot based Secure Network System

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection b...

متن کامل

Implementation of Network Forensics Based on Honeypot

For years, numbers of researches had addressed the serious matters of network attacks, and developed various technologies such as firewalls and intrusion detection systems to prevent the malware attacking. Currently, technologies lack any investigative features because of the network information gathering is too difficult. In this study, we designed a network forensics system, which contented h...

متن کامل

Design and Analysis of Distributed Honeypot System

Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...

متن کامل

Enhancing Intrusion Detection System Performance using Firecol Protection Services based Honeypot System

Nowadays, Internet is one among the famous technique to connect each computer all around the world. The development of nonstop communication creates a number of opportunities and also it develops new possibilities for malicious users. As the size and number of the Internet and Network traffic has become greater and the requirement for the Intrusion Detection grows in step to minimize the Inform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Safety and Security Engineering

سال: 2022

ISSN: ['2041-9031', '2041-904X']

DOI: https://doi.org/10.18280/ijsse.120610