This paper is published in Volume-3, Issue-2, 2017
Area
Network Security
Author
Akshay Harale
Co-authors
Sanket Tambe, Ganesh Kothawale
Org/Univ
Al Ameen Educationla & Medical Foundation College of Engineering, Pune, Maharashtra, India
Pub. Date
29 March, 2017
Paper ID
V3I2-1342
Publisher
Keywords
Network Security, Intrusion Detection System, Honeypot.

Citationsacebook

IEEE
Akshay Harale, Sanket Tambe, Ganesh Kothawale. Detection and Analysis of Network & Application Layer Attacks Using Honey pot With System Security Features, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Akshay Harale, Sanket Tambe, Ganesh Kothawale (2017). Detection and Analysis of Network & Application Layer Attacks Using Honey pot With System Security Features. International Journal of Advance Research, Ideas and Innovations in Technology, 3(2) www.IJARIIT.com.

MLA
Akshay Harale, Sanket Tambe, Ganesh Kothawale. "Detection and Analysis of Network & Application Layer Attacks Using Honey pot With System Security Features." International Journal of Advance Research, Ideas and Innovations in Technology 3.2 (2017). www.IJARIIT.com.

Abstract

Information security in the sense of private and social interactions has become a top priority in digitalized modern world in parallel to the new technological developments. Many approaches, tools, and expertise are used to provide the information security to the information systems. A honeypot is an active defense system for network security. It is able to trap attacks, record intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with the other security solutions, the honeypot is able to solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot and give a classification for honeypot according to security goals and application goals. A honeypot is Java based deception tool having influential services (FTP etc.), it is a “Rule & Anomaly” based intrusion detection engine and a network-based administration and monitoring tool. This paper analysis the attack detector with existing system drawback which presents proposed approach more efficiently. Additional system security features are also added based on accessing the system securely. Features like detection of an intruder based on the timestamp and log-in details are considered. Tracking of the user is based on the system log and other databases pre-defined for secure accessing.
Paper PDF