[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shyamasundar, 2015 - Google Patents

An auto configurated hybrid honeypot for improving security in computer systems

Shyamasundar, 2015

View PDF
Document ID
164620209160924196
Author
Shyamasundar L
Publication year
Publication venue
Int. J. Comput. Sci. Inform. Technol

External Links

Snippet

Providing computer system security is one of the important areas of consideration in Information Technology. There is a rapid advancement in this area because no one exactly wants his system to be attacked by an intruder and the data to be compromised. An …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
CN110381045B (en) Attack operation processing method and device, storage medium and electronic device
Joshi et al. Honeypots: a new paradigm to information security
Chen et al. Intrusion detection
CN110401638B (en) Network traffic analysis method and device
Thom et al. Correlation of cyber threat intelligence data across global honeypots
Lackner How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey.
Karthikeyan et al. Honeypots for network security
Debashi et al. Sonification of network traffic for detecting and learning about botnet behavior
Jeremiah Intrusion detection system to enhance network security using raspberry pi honeypot in kali linux
Thu Integrated intrusion detection and prevention system with honeypot on cloud computing environment
Vokorokos et al. Sophisticated honeypot mechanism-the autonomous hybrid solution for enhancing computer system security
Mane Detect and deactivate P2P Zeus bot
Shyamasundar An auto configurated hybrid honeypot for improving security in computer systems
Fanfara et al. Autonomous hybrid honeypot as the future of distributed computer systems security
Yang et al. A Distributed Honeypot System for Grid Security
Karie et al. Cybersecurity Incident Response in the Enterprise
Al-Dabagh et al. Monitoring and analyzing system activities using high interaction honeypot
Padda et al. Honeypot: A security tool in intrusion detection
ZHANG et al. 5-2 A Holistic Perspective on Understanding and Breaking Botnets: Challenges and Countermeasures
Liu et al. A flow based method to detect penetration
Malhotra Network Defense Strategy on HoneyPot and how to Improve it
Nadiammai et al. Snort Based Network Traffic Anomaly Detector to Improve the Performance of Intrusion Detection System.
Dias Automated Identification of Attacking Tools in a Honeypot
Abraham Hybrid framework for behavioral prediction of network attack using honeypot and dynamic rule creation with different context for dynamic blacklisting
Rase et al. Summarization of Honeypot-A Evolutionary Technology for Securing Data over Network, And Comparison with some Security Techniques