Author : Akshay Kalbande 1
Date of Publication :12th April 2017
Abstract: A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Generally as the number of users for a web service increases , the issues related to security arise too. So does the need arise to secure these systems for reliable and efficient working-One such tool is-Honeypot. As the flow of data increases, the probability of gaining access to confidential data is also high. So detecting vulnerability becomes a preliminary task in order to overcome such malicious activities. In this study, the simulated computers on network are been secured using Honeypot’s design and Framework which helps in many fields such as detection of worms, adversaries, illegitimate traffic, spread of spam email. The honeypots deployed on the network monitors the traffic for any anonymous users and track him to prevent further attacks.
Reference :
-
- D. CanaliAnd D. Balzarotti, “Behind The Scenes Of Online Attacks: An Analysis Of Exploitation Behaviors On The Web,” In Proceedings Of 20th Annual Network & Distributed System Security Symposium (Ndss 2013), Feb. 2013
- C.H. Yeh And C.H. Yang, "Design And Implementation Of Honeypot Of System Based On Open Source Software", In Intelligence And Security Informatics, 2008.Isi 2008. International Conference On,2008, Pp.256-266.
- E. Albin "A Comparative Analysis Of The Snort And Intrusion Detection Systems", Monterey California. Naval Postgraduate School 2011.
- HarekHaugerud "Intrusion Detection And Firewall Security"
- John E Canavan, "Fundamentals Of Network Security".
- A Survey:Recent Advances And Future Trends In Honeypot Research,Published Online Sept 2012 In Mecs
- T. Yagi, N. Tanimoto, And T. Hariu, “Intelligent High- Interaction Web Honeypots Based On Url Conversion Scheme,” Ieice Transactions On Communications, Vol. 94, No. 5, Pp. 1339–1347, May 2011.