CFP last date
20 December 2024
Reseach Article

Design and Analysis of Distributed Honeypot System

by Ritu Tiwari, Abhishek Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 13
Year of Publication: 2012
Authors: Ritu Tiwari, Abhishek Jain
10.5120/8815-2499

Ritu Tiwari, Abhishek Jain . Design and Analysis of Distributed Honeypot System. International Journal of Computer Applications. 55, 13 ( October 2012), 20-23. DOI=10.5120/8815-2499

@article{ 10.5120/8815-2499,
author = { Ritu Tiwari, Abhishek Jain },
title = { Design and Analysis of Distributed Honeypot System },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 13 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number13/8815-2499/ },
doi = { 10.5120/8815-2499 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:57:08.013403+05:30
%A Ritu Tiwari
%A Abhishek Jain
%T Design and Analysis of Distributed Honeypot System
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 13
%P 20-23
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in the centralised control system to improve network security and presents the experimental results which successfully improves the performance of the safety defence systems.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
Index Terms

Computer Science
Information Sciences

Keywords

Firewall Honeypots Honeywall Sebek-client Snort IDS