FTP Based Honeypot Implementation Model for Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.
Authors and Affiliations
Diksha Dewangan, Amit Kumar Dewangan
Biometric Recognition Using Advanced Neural Networks
In recent years, Face recognition becomes one of the popular biometric identification systems used in identifying or verifying individuals and matching it against library of known faces. Biometric identification is an a...
Evaluating the Effect of Modified Bitumen after Short-Term Aging using FTIR Spectroscopy & SEM
In the developing country like India, growth of urbanization is a vital process ultimately leads to the vehicle growth and thus the load on the pavement increases which leads to distress of the pavement. Major problem i...
Educational Data Mining for Classification of Students based on their Performance
Performance of any institution is largely dependent on the success of its students. These students performance may be dependent on various parameters such as student’s knowledge, educational background, teacher’s teachi...
slugMicrostrip Patch Antennas for Broadband Indoor Wireless Systems
The advantages of microstrip antennas have made them a perfect candidate for use in the wireless local area network (WLAN) applications. Though bound by certain disadvantages, microstrip patch antennas can be tailored s...
Trust Based Service in Social Networks - A Survey
Internet of things is going to make a world where physical objects are unlined in corporated into information networks in order to render advanced and intelligent services for human being. Trust management plays a vital...