DocumentCode :
2635523
Title :
Enhancing network intrusion detection system with honeypot
Author :
Yeldi, Sujata ; Gupta, Sweta ; Ganacharya, Tanmay ; Doshi, Shirish ; Bahirat, Dhanashree ; Ingle, Rajesh ; Roychowdhary, Anandamoy
Author_Institution :
Dept. of Comput. Eng., Pune Inst. of Comput. Technol., India
Volume :
4
fYear :
2003
fDate :
15-17 Oct. 2003
Firstpage :
1521
Abstract :
Traditionally, the strategy to defend one´s organization as best as possible is to detect any failures in the defense, and then react to those failures. The problem with this approach is that it is purely defensive; the enemy is on the attack. Honeypots attempt to change this; they give the organizations the ability to take the initiative. Honeypots help to explore new vulnerabilities in an organization and defining the security policy of an organization. A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked or compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. This paper focuses on the possibilities of honeypots and their use in an educational as well as productive environment. Also ´Mirage´ - honeypot developed by us has been discussed. This system was not only implemented but also tested for several days and the collected data of the attacks was analyzed. A conclusion about the new technology of honeypots and a look into the future of honeypots is discussed.
Keywords :
Internet; safety systems; telecommunication security; Internet security; computer security; educational environment; honeypot; network intrusion detection system; Computer networks; Computer security; Data security; Information security; Internet; Intrusion detection; Operating systems; Production; System testing; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific Region
Print_ISBN :
0-7803-8162-9
Type :
conf
DOI :
10.1109/TENCON.2003.1273174
Filename :
1273174
Link To Document :
بازگشت