International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 70 - Number 22 |
Year of Publication: 2013 |
Authors: Ayeni O. A, Alese B. K, Omotosho L. O. |
10.5120/12197-8136 |
Ayeni O. A, Alese B. K, Omotosho L. O. . Design and Implementation of a Medium Interaction Honeypot. International Journal of Computer Applications. 70, 22 ( May 2013), 5-10. DOI=10.5120/12197-8136
Security in computing world is a serious issue and must be handle with utmost care, hence the need to always protect and secure our networks as more and more business are been conducted through the internet. The expansion of the World Wide Web has given unlimited access to attackers to prey on ignorant administrator who lacks basic knowledge of network security. Vulnerabilities in common security components such as firewalls, security patches, access control and encryption are inevitable, so hackers take advantage of these loopholes to break into computer networks. This paper presents the result of a research that was carried out using a medium interaction honeypot, a virtual machine ware workstation, snort software and entropy-based model for capturing, analyzing and detection of malicious traffic targeted at the network. A ring topology network of three system was design using virtual machine work station, a Snort software was installed on all the three machine to capture traffic on the network and entropy-based mathematical analysis was conducted on the traffic to detect attack/malicious traffic. The entropy H(x) = –?_(i=1)^N??(P_i )*? log_2 (P_i) where Pi = N_i/S. N is a set of positive integer that represent the total number of server on the network, n_i represent the size of the traffic in bytes and S represent the total length of the traffic that constitute the traffic. The result of the research work shows detection of malicious traffic and also limit the rate of denial of service targeted at the network.