Design and Implementation of a Medium Interaction Honeypot

作者: Ayeni O.A , Alese B. K , Omotosho L. O.

DOI: 10.5120/12197-8136

关键词:

摘要: Security in computing world is a serious issue and must be handle with utmost care, hence the need to always protect secure our networks as more business are been conducted through internet. The expansion of World Wide Web has given unlimited access attackers prey on ignorant administrator who lacks basic knowledge network security. Vulnerabilities common security components such firewalls, patches, control encryption inevitable, so hackers take advantage these loopholes break into computer networks.This paper presents result research that was carried out using medium interaction honeypot, virtual machine ware workstation, snort software entropy-based model for capturing, analyzing detection malicious traffic targeted at network. A ring topology three system design work station, Snort installed all capture mathematical analysis detect attack/malicious traffic. entropy H(x) = – Pi ∗ N i=1 log2(Pi) where Ni/S. set positive integer represent total number server network, ni size bytes S length constitute shows also limit rate denial service

参考文章(22)
Saleh Ibrahim Bakr Almotairi, Using honeypots to analyse anomalous Internet activities Faculty of Science and Technology; Information Security Institute. ,(2009)
Kevin J. Houle, George M. Weaver, Trends in Denial of Service Attack Technology ,(2001)
Prashant Dewan, Vijay Karamcheti, Partha Dasgupta, Defending Against Denial of Service Attacks Using Secure Name Resolution. international workshop on security. pp. 675- 681 ,(2003)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Steven Michael Bellovin, John Ioannidis, Implementing Pushback : Router-Based Defense Against DDoS Attacks network and distributed system security symposium. ,(2002) , 10.7916/D8R78MXV
Chen-Mou Cheng, H.T. Kung, Koan-Sin Tan, Use of spectral analysis in defense against DoS attacks global communications conference. ,vol. 3, pp. 2143- 2148 ,(2002) , 10.1109/GLOCOM.2002.1189011
Anjali Sardana, Ramesh Chandra Joshi, None, Simulation of dynamic honeypot based redirection to counter service level DDoS attacks international conference on information systems security. pp. 259- 262 ,(2007) , 10.1007/978-3-540-77086-2_21
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Charles P. Pfleeger, Security in Computing ,(1988)