Identifying the Misbehaving User in a Network and Trapping them using Honeypot
P. U, und P. Jayarekha. International Journal of Innovative Science and Modern Engineering (IJISME), 2 (6):
14-17(Mai 2014)
Zusammenfassung
In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.
%0 Journal Article
%1 noauthororeditor
%A U, Praveen J
%A Jayarekha, P
%D 2014
%E Kumar, Dr. Shiv
%J International Journal of Innovative Science and Modern Engineering (IJISME)
%K (NM)nymble Detection Generator) Intrusion Manager). NIDS(Network PM(pseudonym System) TG(Ticket TM(Ticket manager manager)
%N 6
%P 14-17
%T Identifying the Misbehaving User in a Network and Trapping them using Honeypot
%U https://www.ijisme.org/wp-content/uploads/papers/v2i6/F0663052614.pdf
%V 2
%X In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.
@article{noauthororeditor,
abstract = {In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.},
added-at = {2021-09-21T12:58:16.000+0200},
author = {U, Praveen J and Jayarekha, P},
biburl = {https://www.bibsonomy.org/bibtex/2ea47ff36b1f387f8a134d24d72c1e46d/ijisme_beiesp},
editor = {Kumar, Dr. Shiv},
interhash = {9000afde837367501233854414d190a0},
intrahash = {ea47ff36b1f387f8a134d24d72c1e46d},
issn = {2319-6386},
journal = {International Journal of Innovative Science and Modern Engineering (IJISME)},
keywords = {(NM)nymble Detection Generator) Intrusion Manager). NIDS(Network PM(pseudonym System) TG(Ticket TM(Ticket manager manager)},
language = {En},
month = may,
number = 6,
pages = {14-17},
timestamp = {2021-09-21T12:58:16.000+0200},
title = {Identifying the Misbehaving User in a Network and Trapping them using Honeypot},
url = {https://www.ijisme.org/wp-content/uploads/papers/v2i6/F0663052614.pdf},
volume = 2,
year = 2014
}