An Efficient Secured System for Identifying Malicious Network Activity Using Scalable Honeypot |
Author(s): |
| Rahul Patil , SKNSITS, LONAVALA; Ajinkya Virkud, SKNSITS, LONAVALA; Swapnil Miniyar, SKNSITS, LONAVALA; Ajay Sagar, SKNSITS, LONAVALA |
Keywords: |
| Network Attack, IDS Evaluation, Honeypot Evaluation, Attack Handling, IDS Rules, Honeypot rules |
Abstract |
|
Now a day’s in this world there are many malicious activities performed on internet or network. To prevent these IDS is used but in some cases it fails to capture intrusion. So we are using honeypot to prevent the malicious activity after IDS. Honeypot is system which is used capture the intrusion activity on network. Many organizations exert the honeypot to know the bound of attack on their network. In this paper, we are going to deploy several honeypot to grab the malicious activity. It can be easily exerted in many organizations without specialized hardware and cost effective. |
Other Details |
|
Paper ID: IJSRDV3I120171 Published in: Volume : 3, Issue : 12 Publication Date: 01/03/2016 Page(s): 165-166 |
Article Preview |
|
|
|
|
