International Journal of Innovations in Engineering and Technology (IJIET) Design of Network Forensic System Based on
2013
…
6 pages
Sign up for access to the world's latest research
Abstract
Abstract- Network forensics deals with the capturing and analysis of the trace and logs of network intrusions from the multiple systems for providing the information to characterize intrusion or features. This paper demonstrates the internal working of implementation of server honeypot technology and network forensics. Honeypot based system is used to attract the attackers so that their process methodology can be observed and analyzed to improve defense mechanisms. Network Forensic allow administrators to monitor the networks, gather all the intelligent information about all the abnormal traffic, and helps to collect the attack evidence for network forensics. A prototype system have been developed to collect the network logs using honeynet infrastructure and analyze all the logged traffic, which is highly malicious in nature with large volume of attacker’s information. The end result of the system is to collect network data which are highly malicious in nature and which can be used ...
Related papers
Journal of Cybersecurity Research (JCR)
According to studies conducted by researchers across the globe, in recent years there has been an increase in organization and company attacks. Some attacks have been detected, but others, however, were able to bypass the security mechanisms, taking advantage of an unknown vulnerability in security systems. In this context, Honeypots systems aim to collect information on the intruder’s activities and learn about threats and attackers’ behavior. Honeypots systems are not designed to remedy failures or security errors on the network, but are responsible for providing adequate information on potential attackers before compromising real systems. In this paper, a honeypot system was designed to study the techniques used by attackers. We designed and implemented a malware analysis laboratory based on honeypots technology in a controlled environment to analyze various security incidents. The use of honeypots is based on the idea of simulating applications with vulnerabilities and recording...
Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (IDS) is used for monitoring the processes on a system or a network for examining the threats and alerts the administrator about attack. And IDS provide a solution only for the large scale industries, but there is no solution for the small scale industries so model is proposed for honeypot to solve the problem of small scale industries which is the hybrid structure of Snort, Nmap, Xprobe2, and P0f [2]. This model captures the activities of attackers and maintains a log for all these activities. Virtualization is performed with the help of virtual machine. The focus of this report is primarily on preventing the attacks from external and internal attackers and maintaining the log file using honeypot with virtual machine [6].
First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05)
This paper intends to illustrate the usefulness of deploying multiple simple honeypot sensors in a large variety of locations. Indeed, a permanent identification of anomalies that occur on a single sensor allows pinpointing abnormal local activities. These can be the manifest of misconfiguration issues or highlight attacks particular to some given environments. Both cases are important for administrators in charge of the networks hosting the sensors. We propose in this paper a comparison of simple parameters that reveal to be an easy way to determine these abnormal and particular activities. On the basis of two identical honeypot sensors that we have deployed for more than 6 months in France and in Taiwan, we detail the analysis of some anomalies that have been found against one unique sensor only. This is a preliminary but useful stage for network forensics and we intend in a near future to deploy the method over a large number of sensors. This is an ongoing work and we hope that the illustrations we provide all along the paper will be a good incentive for partners to join this open project.
2008
A Honeypot is a security resource, which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. A honeypot can also indicate about how to perform forensics. The information gathered by watching a honeypot being probed is invaluable. It gives information about attacks and attack patterns. Currently, the creation of intrusion detection signatures is a tedious process that requires detailed knowledge of the traffic characteristics of the phenomenon to be detected. In this paper we address these issues. We have proposed, HoneyAnalyzer, a tool for analyzing honeyd-logs in a RDBMS with a webbased monitoring interface. The data collected from Honeypot is analyzed for possible attacks, scans, and viruses. The system displays the honeyd logs as well as traffic analyzer (e.g. Tcpdump) logs in a well-defined graphical manner so that a security administrator can filter the data of honeypot’s log. We also propose the use of a signature e...
The primary focus of this paper is to demonstrate about the exciting new technology " HONEYPOTS ". In this era of technology, the hectic usage of internet plays a major role in all activities ranging from education to money transactions. In order to undergo all these tasks in a healthy manner we must ensure security in the network we use. Honeypots are the developing technology to secure our networks. Honeypots are typically virtual machines, designed to emulate real machines, feigning or creating the appearance of running full services and applications, with open ports that might be found on a typical system or server on a network. Honeypots allows the system administrators to " trace back " the source of hackers. The main goal of this paper is to give an elaborate explanation of honeypots, and how they can be deployed to enhance organizational and enterprise security across critical systems and networks. Honeypots can do everything from detecting new attacks to tracking automated credit card fraud and identity theft. In the past several years we have seen the technology rapidly develop, with new concepts such as honeypot farms, commercial and open source solutions, and documented findings released. Honeypots have different forms which may range from a Windows program that emulates common services, such as the Windows honeypot KFSensor3, to entire networks of real computers to be attacked, such as Honeynet. Some commercial honeypots available are Back Officer Friendly (BOF) by NFR, Tripwire by tripwire, Spector, Mantrap etc. Thus, this new technology of network securing technology increases network security and helps in detecting the hackers.
International Journal of Computer Mathematics: Computer Systems Theory, 2018
Polyhedra are widely used in the verification of numerical programs. Specially, in the field of static analysis by abstract interpretation to express the program invariants. Polyhedra make the analysis very expressive but also very time consuming. That cost is mostly due to the minimization function, which is used to maintain polyhedra in their minimal representation without redundant constraints or generators. In this article, we propose method to over-approximate a polyhedron by minimizing the loss of accuracy. The idea is to find a good trade off between accuracy and execution time. The proposed method is applied as an alternative to the minimization function for the template polyhedra abstract domain.
Seminarios de Escritura Médica y Educación, 2023
Introducción: El estudio de la metodología de la investigación es esencial para garantizar la calidad y la validez del conocimiento científico. La correcta aplicación de los principios metodológicos permite estructurar investigaciones rigurosas y confiables, evitando errores en la formulación del problema, la selección del enfoque y la interpretación de los resultados. Métodos: Se realizó una revisión documental basada en fuentes académicas especializadas en metodología de la investigación. Se analizaron diferentes enfoques metodológicos, las fases del proceso de investigación y la importancia del marco teórico. Se seleccionaron textos clave utilizando criterios de pertinencia, actualidad y rigor académico. Resultados: Se identificaron tres enfoques metodológicos predominantes: cuantitativo, cualitativo y mixto, cada uno con sus ventajas y limitaciones. Además, se establecieron las fases fundamentales del proceso de investigación y la relevancia del marco teórico en la validez del estudio. También se evidenciaron desafíos en la formación metodológica y en la integración de enfoques mixtos. Conclusiones: La metodología de la investigación es un pilar esencial en la generación de conocimiento. La correcta selección del enfoque y la adecuada fundamentación teórica fortalecen la validez de los estudios. Se recomienda mejorar la formación metodológica y explorar nuevas estrategias para optimizar los procesos investigativos.
Fisheries Science, 2002
The gut and gut contents of ayu Plecoglossus altivelis caught in the Ohta River in Hiroshima prefecture, Japan were examined. Relative intestine length (intestine length/body length) was almost constant. Except for relative intestine length, characteristics of the gut of wild ayu were not significantly different from those of cultured ayu. The height of intestinal folds increased and their width declined from stomach to anus. Cyanobacteria (Homoeathrix sp. and Calothrix sp.) and diatoms (Cymbella sp., Gomphonema sp., Melosira sp., Navicula sp., and Synedra sp.) were well digested during passage through the gut despite a lack of apparent destruction. In contrast, green algae (Dictyosphearium sp., Coelastrum sp., and Pediastrum sp.) exhibited little degradation. The pH of stomach contents ranged from 2.8 to 7.4 (mean ± SD = 4.1 ± 1.0), whereas that of the posterior intestine was 7.0-8.5 (7.9 ± 0.4). Gut contents of wild ayu increased with bodyweight, and were more than threefold greater than those of cultured ayu, suggesting that wild ayu compensate for low nutrient content of algae through the continuous ingestion of large quantities of feed organisms.
MIX Sustentável
A indústria de tintas látex utiliza em seu processo água potável em larga escala. Após o uso, esse insumo segue para estações de tratamento de efluentes (ETE), gerando como subproduto um lodo. Atualmente, o descarte desse lodo residual se dá através de envio para fornos de coprocessamento, o que gera uma problemática devido aos custos elevados associados a este processo. O presente trabalho tem como objetivo avaliar a viabilidade de utilização do lodo da ETE de uma empresa de tintas látex como substrato para a produção e cultivo de Lobularia maritime. Para isso, foram realizados cinco tratamentos, compostos por diferentes quantidades de lodo e substrato, nas proporções 10%, 20%, 30%, 40% (substituição em volume de substrato por lodo) e uma testemunha, 0% de lodo. As amostras de lodo e os cinco tratamentos foram caracterizados quanto ao pH, condutividade elétrica (CE), teor total de sais solúveis (TTSS), densidade aparente e seca, teor de umidade e granulometria. Para as amostras de ...
Clinical Medicine, 2020
A specialist registrar in infectious diseases, Royal Free London NHS Foundation Trust; B consultant physician in infectious diseases, Royal Free London NHS Foundation Trust, and honorary senior lecturer, University College London; C specialist registrar in infectious diseases, Royal Free London NHS Foundation Trust, and Wellcome Trust postdoctoral clinical research fellow and NIHR clinical lecturer, University College London The emergence of the novel beta coronavirus SARS-CoV-2 and the ensuing COVID-19 pandemic has generated a rapidly evolving research landscape in the search for new therapeutic agents. The intravenous antiviral drug remdesivir has in vitro activity against SARS-CoV-2 and now studies have reported its clinical efficacy, demonstrating shorter time to recovery in hospitalised patients with severe COVID-19. Adverse event rates were low and remdesivir has now received conditional marketing authorisation from the European Medicines Agency. An interim clinical commissioning policy is in place in the UK. These studies make remdesivir the first antiviral drug able to alter the natural history of severe COVID-19, and a benchmark for the comparison of new therapies in the future. Ongoing studies are investigating its use in early mild/moderate COVID-19, alternative formulations, and the combination of remdesivir with immunomodulatory agents.
References (11)
- Online : www.crime-research.org/news/24.09.2012/3901/.
- McCarty B., "Honeypot forensics part I: analyzing the network" [EB/OL].
- Yasinsac and Yanet Manzano, "Honeytraps, a Network Forensic Tool". Sixth Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA , July 14-18, 2002.
- Raynal, F. Berthier , Y. Biondi, P. Kaminsky, D., "Honeypot Forensics". Proceedings from the Fifth Annual IEEE SMC 10-11 June 2004 page(s): 22-29.
- BLACK'S LAW DICTIONARY 721 (9th ed. 2009).
- A. Almulhem, and I. Traore, "Experience with engineering a network forensics system", Lecture Notes in Computer Science, vol. 3391, pp. 62-71, Jan. 2005.
- Ren W and Jin H., "Modeling the network forensics behaviors", In: Proceedings of the first international conference on security and privacy for emerging areas in communication networks (SecureComm 2005);
- H. Artaila, H. Safab, M. Sraja, I. Kuwatlya, and Z. Al-Masria, "A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks," Computers & Security, Volume 25, Issue 4, pp, 274-288, June 2006.
- L. Corrado, M. Ken and D. Marc., "ScriptGen: An automated script generation tool for honeyd". 21st Annual Computer Security Applications Conference, ACSAC 2005, pp: 203-214.
- C. Thomas M and B. John. "Design considerations for a honeypot for SQL injection attacks". Proceedings -Conference on Local Computer Networks, LCN, pp: 915-921.
- V. Broucek and P. Turner, "Forensic computing: Developing a conceptual approach for an emerging academic discipline", in 5th Australian Security Research Symposium, 2001.