ISSN 2321-3256 (Electronic Version)  
IJSRNSC News
Journal Contents
Current Issue
Archive Issues
Special Issues
Best Paper Award
IJSRNSC Guidelines
Author Guidelines
Editors Guidelines
Reviewer Guidelines
Research Areas
Process & Policies
Peer-Review Process
Plagiarism Policy
Correction Policy
Ethics and Malpractice
 Digital Certificate
       
    Regular Issues Certificate
    Special Issue Certificate
       
 Download
       
    IJSRNSC Template
    Copyright Transfer Form
    Originality Certificate
       
FAQs
 
Full Paper View
Open Access   Article

Honeypots: Virtual Network Intrusion Monitoring System
Manmohan Dagar1 , Rashmi Popli2
1 Department of Computer Networking, YMCA University of Science and Technology, Faridabad, India.
2 Department of Computer Networking and Information Technology, YMCA University of Science and Technology, Faridabad, India.
Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.45-49, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.4549

Online published on Apr 30, 2018
Copyright © Manmohan Dagar, Rashmi Popli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: Manmohan Dagar, Rashmi Popli, “Honeypots: Virtual Network Intrusion Monitoring System”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.45-49, 2018.

MLA Style Citation: Manmohan Dagar, Rashmi Popli "Honeypots: Virtual Network Intrusion Monitoring System." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 45-49.

APA Style Citation: Manmohan Dagar, Rashmi Popli, (2018). Honeypots: Virtual Network Intrusion Monitoring System. International Journal of Scientific Research in Network Security and Communication, 6(2), 45-49.
           
1 Views    1 Downloads    1 Downloads
Abstract :
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider and the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your information. This paper discusses how honeypot technologies can be used to detect, identify, and gather information on these specific threats.
Key-Words / Index Term :
Honeypot, Intrusion Detection System (IDS), Honeyd, Load Balancer, Honeycomb and Honeywall
References :
[1] Spitzner, L. 2002. Honeypots: Tracking Hackers. 1st ed. Boston, MA, USA: Addison Wesley.
[2] Mokube, I. & Adams M., 2007. Honeypots: Concepts, Approaches, and Challenges. ACMSE 2007, March 23-24, 2007, Winston-Salem, North Carolina, USA.
[3] Aaron Lanoy and Gordon W. Romney, Senior Member. A Virtual Honey Net as a Teaching Resource," 2006 7th International Conference on Information Technology Based Higher Education and Training, Ultimo, NSW, pp. 666-669, 2006.
[4] A Survey of Botnet Technology and Defenses. Available from: M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, "A Survey of Botnet Technology and Defenses," 2009 Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, pp. 299-304, 2009.
[5] Abigail Paradise, Asaf Shabtai, Rami Puzis - "Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks," in IEEE Transactions on Computational Social Systems, vol. 4, no. 3, pp. 65-79, Sept. 2017.
[6] S. Kemp. Digital in 2017: Global Overview, accessed on Jan. 24, 2017.
[7] The Honeynet Project. (2014). “Outsmarting the smart meter”
[8] Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.
[9] J. Markert and M. Massoth, “Honeypot framework for wireless sensor networks,” in Proc. Int. Conf. Adv. Mob. Comput. Mult., Dec. 2013.
[10] V. Pothamsetty and M. Franz, SCADA HoneyNet Project: Building Honeypots for Industrial Networks, tech. report, Cisco Systems, 2005
[11] N. Provos, Developments of the Honeyd Virtual Honeypot, user forum, 2008
[12] Kun Wang, Miao Du, Sabita Maharjan - "Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid," in IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2474-2482, Sept. 2017.
[13] The Honeynet Project, Honeywall, 2016.
[14] V. Paxson, .Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23-24, pp. 2435.2463, 1998.
[15] M. Roesch, .Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on Systems Administration, 1999
[16] R. Piggin, I. Buffey - "Active defence using an operational technology honeypot," 11th International Conference on System Safety and Cyber-Security (SSCS 2016), London, pp. 1-6, 2016.
[17] Nikita M. Danchenko, Anton O. Prokofiev, Dmitry S. Silnov "Detecting suspicious activity on remote desktop protocols using Honeypot system," 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, pp. 127-128, 2017.
[18] Pradeep Chouksey, "Study of Routing in Ad hoc network", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.55-57, 2017.
[19] M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017
 
 
User Section
Login

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
   
     
  Login 
     
New User?   Forgot Password
     
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  submit@ijsrnsc.org or view contact page for more details.

 Journal Statistics
UGC J. No. 46614
Citations 070
h-index 004
i10-index 001
IF Valune 2.422
 
 
 
 
Call for Reviewer
     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0