High Impact Factor : 4.396 icon | Submit Manuscript Online icon | UGC Approved icon

Detection and Analysis of Network & Application Layer Attacks using Honeypot with System Security Features

Author(s):

Akshay Harale , Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA; Sanket Tambe, Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA; Prof. G. S. Kothawale, Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA

Keywords:

Network Security, Intrusion Detection System, Honeypot

Abstract

Information related security in the sense of end user interactions has become a one of the most top priority in digitalized modern world in coordinate to the new and latest technological developments. Many approaches, tools, and expertise are used to provide the information security to the information systems. Honeypot is an active defense system for network security. It is able to traps raid, record intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with the other security solutions, the honeypot is able to solve many traditional dilemmas. We expatiate key segments of data capture and data control in a honeypot and give a classification for honeypot according to security goals and application goals. Honeypot is Java based deception tool having influential services (FTP etc.), it is a “Rule & Anomaly” based intrusion detection engine and a network-based administration and monitoring tool. This paper analysis the attack detector with existing system drawback which presents proposed approach more efficiently. Additional system security features are also added based on accessing the system securely. Features like detection of an intruder based on the time stamp and log-in details are considered. Tracking of the user is based on the system log and other databases pre-defined for secure accessing.

Other Details

Paper ID: IJSRDV5I40166
Published in: Volume : 5, Issue : 4
Publication Date: 01/07/2017
Page(s): 18-21

Article Preview

Download Article