@ijisme_beiesp

Identifying the Misbehaving User in a Network and Trapping them using Honeypot

, und . International Journal of Innovative Science and Modern Engineering (IJISME), 2 (6): 14-17 (Mai 2014)

Zusammenfassung

In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.

Links und Ressourcen

Tags