High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

An Efficient Secured System for Identifying Malicious Network Activity Using Scalable Honeypot

Author(s):

Rahul Patil , SKNSITS, LONAVALA; Ajinkya Virkud, SKNSITS, LONAVALA; Swapnil Miniyar, SKNSITS, LONAVALA; Ajay Sagar, SKNSITS, LONAVALA

Keywords:

Network Attack, IDS Evaluation, Honeypot Evaluation, Attack Handling, IDS Rules, Honeypot rules

Abstract

Now a day’s in this world there are many malicious activities performed on internet or network. To prevent these IDS is used but in some cases it fails to capture intrusion. So we are using honeypot to prevent the malicious activity after IDS. Honeypot is system which is used capture the intrusion activity on network. Many organizations exert the honeypot to know the bound of attack on their network. In this paper, we are going to deploy several honeypot to grab the malicious activity. It can be easily exerted in many organizations without specialized hardware and cost effective.

Other Details

Paper ID: IJSRDV3I120171
Published in: Volume : 3, Issue : 12
Publication Date: 01/03/2016
Page(s): 165-166

Article Preview

Download Article