ProgramsView all programs
From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Journal Article
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : (IJCNS) International Journal of Computer and Network Security
Source : (IJCNS) International Journal of Computer and Network Security, Volume 2, Issue 8, p.27-32 (2010)
Keywords : Honeynet, Honeypot, IDS, IPS, Snort.
Campus : Coimbatore
School : Centre for Cybersecurity Systems and Networks, School of Engineering
Center : TIFAC CORE in Cyber Security
Department : Computer Science, cyber Security
Year : 2010
Abstract : This paper describes Honeynet, a system for automated generation of attack signatures for network intrusion detection and prevention systems. A honeypot is a security resource whose value lies in being probed, attacked or compromised. We examine different kinds of honeypots, honeypot concepts, and approaches to their implementation. Our system applies pattern detection techniques and protocol based classification on the traffic captured on a honeypot system. Softwares like Sun virtual box-VMware were used for this purpose so that it was not required to buy large number of high end systems for implementing this setup and thereby cost was reduced in a great extend. While running Honeynet on a WAN environment, the system successfully created precise traffic signatures and updates the firewall that otherwise would have required the skills and time of a security officer.
Cite this Research Publication : A. .K.S, .V.Nath, H., Kutty, T. N., and Dr. Gireesh K. T., “Low Budget Honeynet Creation and Implementation for Nids and Nips”, (IJCNS) International Journal of Computer and Network Security, vol. 2, no. 8, pp. 27-32, 2010.