Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Advanced Honeypot Architecture for Network Threats Quantification
Abstract of Project : Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered everyday and affect users and companies at critical levels, from privacy issues to financial losses. Monitoring network activity is a mandatory step for researchers and security analysts to understand these threats and to build better protections. Honeypots were introduced to monitor unused IP spaces to learn about attackers. The advantage of honeypots over other monitoring solutions is to collect only suspicious activity. However, current honeypots are expensive to deploy and complex to administrate especially in the context of large organization networks. This study addresses the challenge of improving the scalability and flexibility of honeypots by introducing a novel hybrid honeypot architecture. This architecture is based on a Decision Engine and a Redirection Engine that automatically filter attacks and save resources by reducing the size of the attack data collection and allow researchers to actively specify the type of attack they want to collect. For a better integration into the organization network, this architecture was combined with network flows collected at the border of the production network. By offering an exhaustive view of all communications between internal and external hosts of the organization, network flows can 1) assist the configuration of honeypots, and 2) extend the scope of honeypot data analysis by providing a comprehensive profile of network activity to track attackers in the organization network. These capabilities were made possible through the development of a passive scanner and server discovery algorithm working on top of network flows. This algorithm and the hybrid honeypot architecture were deployed and evaluated at the University of Maryland, which represents a network of 40,000 computers. This study marks a major step toward leveraging honeypots into a powerful security solution. The contributions of this study will enable security analysts and network operators to make a precise assessment of the malicious activity targeting their network.
Keywords: Computer Science, honeypot, hybrid architecture, network attack, network monitoring, network security, quantification
Download
Most Popular Posts
-
Parallel computing is defined as the simultaneous use of more than one processor to execute a program. The idea is based on the fact ...
-
Why Use Parallel Computing? The primary reasons for using parallel computing Other reasons might include Limits to serial computing - bot...
-
Paper Presentation on BIOMETRICS This present century is full of inventions and discovery, which lead to the invention of many sophis...
-
Indian Railways is having the world’s largest railway network. Railways is the primary mode of public transport. Due to negligence, tech...
-
Two important and active areas of current research are data mining and world wide web.A natural combination of the two areas sometimes r...
-
IMAGE PROCESSING Image processing is any form of signal processing for which the input is an image, such as photographs or frames of vid...
-
Processing of digital images by means of digital computer refers to digital image processing. Digital images are composed of finite numb...
-
Data mining process the decision making using data provided by data warehouse. The Relational Model revolutionized transaction processin...
-
Wireless communication is the transfer of information over a distance without the use of electrical conductors or "wires". T...
-
Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com