Full Paper View Go Back

Honeypots: Virtual Network Intrusion Monitoring System

Manmohan Dagar1 , Rashmi Popli2

1 Department of Computer Networking, YMCA University of Science and Technology, Faridabad, India.
2 Department of Computer Networking and Information Technology, YMCA University of Science and Technology, Faridabad, India.

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.45-49, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.4549


Online published on Apr 30, 2018


Copyright © Manmohan Dagar, Rashmi Popli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manmohan Dagar, Rashmi Popli, “Honeypots: Virtual Network Intrusion Monitoring System,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.45-49, 2018.

MLA Style Citation: Manmohan Dagar, Rashmi Popli "Honeypots: Virtual Network Intrusion Monitoring System." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 45-49.

APA Style Citation: Manmohan Dagar, Rashmi Popli, (2018). Honeypots: Virtual Network Intrusion Monitoring System. International Journal of Scientific Research in Network Security and Communication, 6(2), 45-49.

BibTex Style Citation:
@article{Dagar_2018,
author = {Manmohan Dagar, Rashmi Popli},
title = {Honeypots: Virtual Network Intrusion Monitoring System},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {45-49},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=326},
doi = {https://doi.org/10.26438/ijcse/v6i2.4549}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.4549}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=326
TI - Honeypots: Virtual Network Intrusion Monitoring System
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Manmohan Dagar, Rashmi Popli
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 45-49
IS - 2
VL - 6
SN - 2347-2693
ER -

1521 Views    566 Downloads    268 Downloads
  
  

Abstract :
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider and the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your information. This paper discusses how honeypot technologies can be used to detect, identify, and gather information on these specific threats.

Key-Words / Index Term :
Honeypot, Intrusion Detection System (IDS), Honeyd, Load Balancer, Honeycomb and Honeywall

References :
[1] Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley.
[2] Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23-24, 2007, Winston-Salem, North Carolina, USA.
[3] Aaron Lanoy and Gordon W. Romney, Senior Member. A Virtual Honey Net as a Teaching Resource," 2006 7th International Conference on Information Technology Based Higher Education and Training, Ultimo, NSW, pp. 666-669, 2006.
[4] A Survey of Botnet Technology and Defenses. Available from: M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, "A Survey of Botnet Technology and Defenses," 2009 Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, pp. 299-304, 2009.
[5] Abigail Paradise, Asaf Shabtai, Rami Puzis - "Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks," in IEEE Transactions on Computational Social Systems, vol. 4, no. 3, pp. 65-79, Sept. 2017.
[6] S. Kemp. Digital in 2017: Global Overview, accessed on Jan. 24, 2017.
[7] The Honeynet Project. (2014). “Outsmarting the smart meter”
[8] Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.
[9] J. Markert and M. Massoth, “Honeypot framework for wireless sensor networks,” in Proc. Int. Conf. Adv. Mob. Comput. Mult., Dec. 2013.
[10] V. Pothamsetty and M. Franz, SCADA HoneyNet Project: Building Honeypots for Industrial Networks, tech. report, Cisco Systems, 2005
[11] N. Provos, Developments of the Honeyd Virtual Honeypot, user forum, 2008
[12] Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.
[13] The Honeynet Project, Honeywall, 2016.
[14] V. Paxson, .Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23-24, pp. 2435.2463, 1998.
[15] M. Roesch, .Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on Systems Administration, 1999
[16] R. Piggin, I. Buffey - "Active defence using an operational technology honeypot," 11th International Conference on System Safety and Cyber-Security (SSCS 2016), London, pp. 1-6, 2016.
[17] Nikita M. Danchenko, Anton O. Prokofiev, Dmitry S. Silnov "Detecting suspicious activity on remote desktop protocols using Honeypot system," 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, pp. 127-128, 2017.
[18] Pradeep Chouksey, "Study of Routing in Ad hoc network", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.55-57, 2017.
[19] M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation