作者: Ayeni O.A , Alese B. K , Omotosho L. O.
DOI: 10.5120/12197-8136
关键词:
摘要: Security in computing world is a serious issue and must be handle with utmost care, hence the need to always protect secure our networks as more business are been conducted through internet. The expansion of World Wide Web has given unlimited access attackers prey on ignorant administrator who lacks basic knowledge network security. Vulnerabilities common security components such firewalls, patches, control encryption inevitable, so hackers take advantage these loopholes break into computer networks.This paper presents result research that was carried out using medium interaction honeypot, virtual machine ware workstation, snort software entropy-based model for capturing, analyzing detection malicious traffic targeted at network. A ring topology three system design work station, Snort installed all capture mathematical analysis detect attack/malicious traffic. entropy H(x) = – Pi ∗ N i=1 log2(Pi) where Ni/S. set positive integer represent total number server network, ni size bytes S length constitute shows also limit rate denial service