Shyamasundar, 2015 - Google Patents
An auto configurated hybrid honeypot for improving security in computer systemsShyamasundar, 2015
View PDF- Document ID
- 164620209160924196
- Author
- Shyamasundar L
- Publication year
- Publication venue
- Int. J. Comput. Sci. Inform. Technol
External Links
Snippet
Providing computer system security is one of the important areas of consideration in Information Technology. There is a rapid advancement in this area because no one exactly wants his system to be attacked by an intruder and the data to be compromised. An …
- 238000005516 engineering process 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110381045B (en) | Attack operation processing method and device, storage medium and electronic device | |
Joshi et al. | Honeypots: a new paradigm to information security | |
Chen et al. | Intrusion detection | |
CN110401638B (en) | Network traffic analysis method and device | |
Thom et al. | Correlation of cyber threat intelligence data across global honeypots | |
Lackner | How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey. | |
Karthikeyan et al. | Honeypots for network security | |
Debashi et al. | Sonification of network traffic for detecting and learning about botnet behavior | |
Jeremiah | Intrusion detection system to enhance network security using raspberry pi honeypot in kali linux | |
Thu | Integrated intrusion detection and prevention system with honeypot on cloud computing environment | |
Vokorokos et al. | Sophisticated honeypot mechanism-the autonomous hybrid solution for enhancing computer system security | |
Mane | Detect and deactivate P2P Zeus bot | |
Shyamasundar | An auto configurated hybrid honeypot for improving security in computer systems | |
Fanfara et al. | Autonomous hybrid honeypot as the future of distributed computer systems security | |
Yang et al. | A Distributed Honeypot System for Grid Security | |
Karie et al. | Cybersecurity Incident Response in the Enterprise | |
Al-Dabagh et al. | Monitoring and analyzing system activities using high interaction honeypot | |
Padda et al. | Honeypot: A security tool in intrusion detection | |
ZHANG et al. | 5-2 A Holistic Perspective on Understanding and Breaking Botnets: Challenges and Countermeasures | |
Liu et al. | A flow based method to detect penetration | |
Malhotra | Network Defense Strategy on HoneyPot and how to Improve it | |
Nadiammai et al. | Snort Based Network Traffic Anomaly Detector to Improve the Performance of Intrusion Detection System. | |
Dias | Automated Identification of Attacking Tools in a Honeypot | |
Abraham | Hybrid framework for behavioral prediction of network attack using honeypot and dynamic rule creation with different context for dynamic blacklisting | |
Rase et al. | Summarization of Honeypot-A Evolutionary Technology for Securing Data over Network, And Comparison with some Security Techniques |