IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 5, May 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



LAN Based Intrusion Detection And Alerts

[Full Text]

 

AUTHOR(S)

Vivek Malik, Mohit Jhawar, Harleen, Akshay Khanijau, Nakul Chawla

 

KEYWORDS

Index Terms: Honeypots, Honeypot Intrusion Detection System, Honeyd, Intrusion Detection System, Nmap, Port Scanning, System generated e-mail alert

 

ABSTRACT

Abstract : With the ever increasing size and number of networks around the world, the network traffic increases even more. The pace at which such an increase is observed, gives a rise to the need of Intrusion Detection exponentially. Under such circumstances, data is vulnerable to its maximum capacity. Intrusion Detection is required to safeguard the public servers from unauthorized access. Filtering of unauthorized access attempts whilst maintaining low latency in order not to interfere and compromise network capacity and bandwidth has become a cause of major concern. Implementation of Intrusion Detection system thus comes into play. It segregates the traffic from authenticated clients and attackers or intruders, while simultaneously ceding the issues of latency, security, bandwidth and throughput of the network. The ever increasing types of computer attacks are getting more and more difficult to identify. Hence the use of honeypots may provide an effective and reliable solution to Intrusion Detection and Alert mechanisms.

 

REFERENCES

[1] https://www.thefreedictionary.com/intrusion

[2] SANS Institute InfoSec Reading Room,”Understanding Intrusion DetectionSystems”,https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337 (2001)

[3] “An Introduction to Intrusion Detection Systems and the Dragon IDS Suite”, http://www.intrusion-detection-system-group.co.uk/

[4] Wayne T Work, "Intrusion Detection Systems - What are they and how they work", Security Gauntlet Consulting 56 Applewood LaneNaugatuck, CT 06770, 203.217.5004, 6/12/2003

[5] Yogendra Kumar Jain, Surabhi Singh, "Honeypot Based Secure Nework", Vol 3 No,2 Feb 2011, ISSN: 0975-3397, pp 612-620

[6] Lance spitzner, "Honeypots: Tracking Hackers", USA:Addison Wesley, 0-321-10895-7, ch 3/4/8, 2002

[7] Jammi Ashok, Y. Raju, S. Munisankariah, "Intrusion Detection Through Honeypots", IJEST10-02-10-055, ISSN: 0975: 5462, pp 5689-5610

[8] Ram Kumar Singh, T. Ramanujan, "Intrusion Detection System Using Advanced Honeypots", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009

[9] Travis Altman, “Honeypot/honeyd tutorial part 1, getting started”, http://travisaltman.com/honeypot-honeyd-tutorial-part-1-getting-started/ (2011)

[10] Travis Altman, “Honeypot/honeyd tutorial part 2, multiple honeypots”, http://travisaltman.com/honeypot-honeyd-tutorial-part-2-multiple-honeypots/ (2011)