Projects, Thesis, Final Year Projects, IT, MBA, Seminar
Advanced Honeypot Architecture for Network Threats Quantification
Abstract of Project : Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered everyday and affect users and companies at critical levels, from privacy issues to financial losses. Monitoring network activity is a mandatory step for researchers and security analysts to understand these threats and to build better protections. Honeypots were introduced to monitor unused IP spaces to learn about attackers. The advantage of honeypots over other monitoring solutions is to collect only suspicious activity. However, current honeypots are expensive to deploy and complex to administrate especially in the context of large organization networks. This study addresses the challenge of improving the scalability and flexibility of honeypots by introducing a novel hybrid honeypot architecture. This architecture is based on a Decision Engine and a Redirection Engine that automatically filter attacks and save resources by reducing the size of the attack data collection and allow researchers to actively specify the type of attack they want to collect. For a better integration into the organization network, this architecture was combined with network flows collected at the border of the production network. By offering an exhaustive view of all communications between internal and external hosts of the organization, network flows can 1) assist the configuration of honeypots, and 2) extend the scope of honeypot data analysis by providing a comprehensive profile of network activity to track attackers in the organization network. These capabilities were made possible through the development of a passive scanner and server discovery algorithm working on top of network flows. This algorithm and the hybrid honeypot architecture were deployed and evaluated at the University of Maryland, which represents a network of 40,000 computers. This study marks a major step toward leveraging honeypots into a powerful security solution. The contributions of this study will enable security analysts and network operators to make a precise assessment of the malicious activity targeting their network.
Keywords: Computer Science, honeypot, hybrid architecture, network attack, network monitoring, network security, quantification
Download
Most Popular Posts
-
Leather Technology Seminar Topics And Project Topics Titles (B.tech/ B.E Leather Technology) List given Below are the Seminar Topics And pro...
-
Download this project with code below : This is a (ECE) Electronics and Communication Project report on GSM based Micro-controller Irrigati...
-
Presentation On Beyond Airbus 380 - Aeronautical Engineering Similar to all aircrafts AIRBUS A380 also uses evacuation slides to sav...
-
This is a Mechanical Engineering project report on Rotary Drum Vacuum Filter. Rotary drum vacuum filter is a solid liquid filtration equipme...
-
Haptics refers to sensing and manipulationn through touch. The word comes from thee Greek ‘haptesthai’, meaning ‘to touch’.The histo...
-
“Recent trends in mobile communication” (E-TICKETING THROUGH MOBILES) Contents : 1 .Abst...
-
Paper Presentation on BIOMETRICS This present century is full of inventions and discovery, which lead to the invention of many sophis...
-
The current cellular networks use many different, in compatible standards which relay on different frequency modulation techniques. T...
-
Title : A Sensor Network Data Aggregation Technique Abstract: This paper is on the Existing sensor network data aggregation techniques ass...
-
Powerpoint Presentation of Nanotechnology in Medicine The prefix “nano”is a Greek word for “dwarf” One nanometer (nm) is equal to one-b...
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to
www.projectsworlds.blogspot.com
For Any Feedback and Suggestions send mail.
If There is any problem in the Document View or Download please send mail to projectsworld@live.com