Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/2466
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondra, J R-
dc.contributor.authorBharti, S K-
dc.date.accessioned2016-03-17T12:56:52Z-
dc.date.available2016-03-17T12:56:52Z-
dc.date.issued2016-03-
dc.identifier.citation3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16-18th March 2016en_US
dc.identifier.urihttp://hdl.handle.net/2080/2466-
dc.descriptionCopyright belongs to proceeding publisheren_US
dc.description.abstractAttacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. “Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks”. This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.en_US
dc.publisherIEEEen_US
dc.subjectControl centeen_US
dc.subjectFirewallen_US
dc.subjectHoneypotsen_US
dc.subjectHoneypssot farmen_US
dc.subjectHoneywallen_US
dc.subjectSebeken_US
dc.subjectSnorten_US
dc.subjectVirtual honeyd.en_US
dc.titleHoneypot-Based Intrusion Detection System: A Performance Analysisen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2016-IndiaCom_Kondra_IEEE_Honeypot.pdf865.65 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.