SECURING WMN USING HONEYPOT TECHNIQUE

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2

Abstract

WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors. A collection of such Honeypots laid to effectively trap the attacker is called a Honeynet. In our paper, we propose a honeynet, that is able to trap the attackers by analyzing their attacking techniques and thereby sending the logs to a centralized repository to analyze those logs so as to better understand the technique used for attacking.

Authors and Affiliations

Priyanka Gupta , Paramjeet Rawat , Suraj Malik , Sudhanshu Gupta

Keywords

Related Articles

K-Partition Model for Mining Frequent Patterns in Large Databases

Mining frequent patterns has always been a great field of research for investigators. Various algorithms were developed for finding out frequent patterns in an efficient manner. But the major drawback of all these resear...

A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems

Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws enco...

ERPCA: A Novel Approach for Risk Evaluation of Multidimensional Risk Prediction Clustering Algorithm

Clustering is a data mining technique used to place data elements into related groups without advance knowledge of the group definitions. In this paper clustering is employed to support efficient decision making by clust...

Secure Routing In Wireless Sensor Networks

A base station will have capabilities on the order of a laptop or laptop-equivalent and will be capable of both wired connectivity to the internet as well as wireless connectivity to the sensor network. Wireless sensor n...

Smart phone Application using Morse Code and Inaudible Frequency

In this paper, the wireless communication using Morse code and inaudible frequency has been discussed. The application of this project is to transfer the limited information with the help of inaudible frequency and AAC....

Download PDF file
  • EP ID EP155870
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Priyanka Gupta, Paramjeet Rawat, Suraj Malik, Sudhanshu Gupta (2012). SECURING WMN USING HONEYPOT TECHNIQUE. International Journal on Computer Science and Engineering, 4(2), 235-238. https://europub.co.uk./articles/-A-155870