SECURING WMN USING HONEYPOT TECHNIQUE
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.
Authors and Affiliations
Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta
Classification of Breast cancer by comparing Back propagation training algorithms
Breast cancer diagnosis has been approached by various machine learning techniques for many years. This paper presents a study on classification of Breast cancer using Feed Forward Artificial Neural Networks. Back propag...
Improving Ischemic Beat Classification Using Fuzzy- Genetic Based PCA And ICA
In this paper, an improved version of Principal Component nalysis (PCA) and Independent Component Analysis (ICA) is proposed for feature extraction to classify the ischemic beats from electrocardiogram (ECG) signal. The...
An analysis of cross avoidance techniques in optical multistage interconnection networks
It is expected that users of telecommunication services such as Internet, Web browsing, and tele-education will increase dramatically. This has greatly increased the demand for high bandwidth and high capacity communicat...
Malware Analysis & its Application to Digital Forensic
In this paper we present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achievin...
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
Vehicular ad hoc networks are a special case of mobile ad hoc networks (MANETs). Unlike MANETs, VANET nodes are moving very fast. It becomes quite challenging to maintain a stable path for broadcasting Emergency and Warn...