Information precautions using intellectual honeypot instrument
Keywords:
AODV, Blackhole, Honeypot, Intrution Detection, HoneynetsAbstract
A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defence to supplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.
References
Honeynet Project, 2001. “Know Your Enemy: Learning about Security Threats”, 2nd Edition Addison Wesley Press.
Karthik, S., Samudrala, B., Yang, A.T., 2009. Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges, 20, (4).
Know Your Enemy, 2003. Passive Honeynets. Honeynet Project. 18 January, 2003. http://project.honeynet.org/
Li-juan, Z., 2009. “Honeypot-based Defence System Research and Design”, IEEE.
Pirzada, A.A., 2005. McDonald, C.,” Secure Routing with the AODV Protocol”, 2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3 - 5 October.
Prathapani, A., 2009. Lakshmi and Dharma P.Agrawal : “Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks”, IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 Arul L Selvakumar, K. Lecturer
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.