Honeypot based Secure Network System

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different events. Before deploying a honeypot it is advisable to have a clear idea of what the honeypot should and should not do. There should be clear understanding of the operating systems to be used and services (like a web server, ftp server etc) a honeypot will run. The risks involved should be taken into consideration and methods to tackle or reduce these risks should be understood. It is also advisable to have a plan on what to do should the honeypot be compromised. In case of production honeypots, a honeypot policy addressing security issues should be documented. Any legal issues with respect to the honeypots or their functioning should also be taken into consideration. In this paper we explain the relatively new concept of “honeypot.” Honeypots are a computer specifically designed to help learn the motives, skills and techniques of the hacker community and also describes in depth the concepts of honeypots and their contribution to the field of network security. The paper then proposes and designs an intrusion detection tool based on some of the existing intrusion detection techniques and the concept of honeypots.

Authors and Affiliations

Yogendra Kumar Jain , Surabhi Singh

Keywords

Related Articles

ICS: An Interactive Control System for Simulating the Probability of Car Accidents with Object Oriented Paradigm and Cellular Automaton

As the number of vehicles continues to grow, more accidents occur most likely due to careless driving of the drivers who do not maintain the safety distance. To assist managers in their tasks of traffic planning, a syste...

A Comparative Study of Google and Bing Search Engines in Context of Precision and Relative Recall Parameter

This paper compared the retrieval effectiveness in context of precision and relative recall of Google and Bing search engine for evaluating the effectiveness of both search engine. The queries used are related to general...

Modified OCABTR based Hierarchical Two Level Data Aggregation in Wireless Sensor Networks

In Wireless Sensor Network (WSN), it is necessary to optimize the energy of the sensor node. Each sensor node is equipped with a battery which is used for sensing and processing the data. Cluster based data aggregation a...

Quantum Teleportation circuit using Matlab and Mathematica

This Paper describes a basic Quantum Teleportation circuit using mat lab Qlib tool. Teleportation is a new and exciting field of future communication. We know that security in data communication is a major concern nowada...

SQL Injection in Oracle An exploration of vulnerabilities

Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection ca...

Download PDF file
  • EP ID EP119051
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Yogendra Kumar Jain, Surabhi Singh (2011). Honeypot based Secure Network System. International Journal on Computer Science and Engineering, 3(2), 612-620. https://europub.co.uk./articles/-A-119051