Detection and Analysis of Network & Application Layer Attacks using Honeypot with System Security Features |
Author(s): |
Akshay Harale , Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA; Sanket Tambe, Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA; Prof. G. S. Kothawale, Al-AMEEN COLLEGE OF ENGINEERING ,KOREGAON BHIMA,PUNE-412216,INDIA |
Keywords: |
Network Security, Intrusion Detection System, Honeypot |
Abstract |
Information related security in the sense of end user interactions has become a one of the most top priority in digitalized modern world in coordinate to the new and latest technological developments. Many approaches, tools, and expertise are used to provide the information security to the information systems. Honeypot is an active defense system for network security. It is able to traps raid, record intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with the other security solutions, the honeypot is able to solve many traditional dilemmas. We expatiate key segments of data capture and data control in a honeypot and give a classification for honeypot according to security goals and application goals. Honeypot is Java based deception tool having influential services (FTP etc.), it is a “Rule & Anomaly†based intrusion detection engine and a network-based administration and monitoring tool. This paper analysis the attack detector with existing system drawback which presents proposed approach more efficiently. Additional system security features are also added based on accessing the system securely. Features like detection of an intruder based on the time stamp and log-in details are considered. Tracking of the user is based on the system log and other databases pre-defined for secure accessing. |
Other Details |
Paper ID: IJSRDV5I40166 Published in: Volume : 5, Issue : 4 Publication Date: 01/07/2017 Page(s): 18-21 |
Article Preview |
|
|