Misra et al. - Google Patents
Design of Network Forensic System Based on HoneynetMisra et al.
View PDF- Document ID
 - 8437711609258909248
 - Author
 - Misra R
 - Dhir R
 - Publication venue
 - Int. J. Innov. Eng. Technol
 
External Links
Snippet
Network forensics deals with the capturing and analysis of the trace and logs of network  intrusions from the multiple systems for providing the information to characterize intrusion or  features. This paper demonstrates the internal working of implementation of server honeypot … 
    - 238000004458 analytical method 0 abstract description 32
 
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1425—Traffic logging, e.g. anomaly detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
 - H04L63/1416—Event detection, e.g. attack signature detection
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1458—Denial of Service
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1433—Vulnerability analysis
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 - H04L63/1441—Countermeasures against malicious traffic
 - H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L43/00—Arrangements for monitoring or testing packet switching networks
 - H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
 - H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
 - H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
 - H04L63/0218—Distributed architectures, e.g. distributed firewalls
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Sharafaldin et al. | Towards a reliable intrusion detection benchmark dataset | |
| JP7250703B2 (en) | Assessment and remediation of correlation-driven threats | |
| Pilli et al. | Network forensic frameworks: Survey and research challenges | |
| Hunt et al. | Network forensics: an analysis of techniques, tools, and trends | |
| Sinchana et al. | Performance evaluation and analysis of various network security tools | |
| Alsharabi et al. | Detecting unusual activities in local network using snort and wireshark tools | |
| Soepeno | Wireshark: An Effective Tool for Network Analysis | |
| Atri et al. | Optimization of Network Mapping for Screening and Intrusion Sensing Devices | |
| Kaushik et al. | Network forensic system for port scanning attack | |
| Mishra et al. | The Role of Wireshark in Packet Inspection and Password Sniffing for Network Security | |
| Joshi et al. | Network forensic tools | |
| Sharma | Honeypots in Network Security | |
| Paravathi et al. | Packet sniffing | |
| Dagdee et al. | Intrusion attack pattern analysis and signature extraction for web services using honeypots | |
| Ogbu et al. | Intranet security using a LAN packet sniffer to monitor traffic | |
| Mathas et al. | Reconnaissance | |
| Misra et al. | Design of Network Forensic System Based on Honeynet | |
| Kaur et al. | Design & implementation of Linux based network forensic system using Honeynet | |
| Bhuyan et al. | Practical tools for attackers and defenders | |
| Hubballi et al. | Event Log Analysis and Correlation: A Digital Forensic Perspective | |
| Clementschitsch | Flowbreaker: Enriched Descriptions of Network Traffic Captures | |
| Biswas et al. | Network Forensics Analysis | |
| Patil | Securing Remote access communications using Deep packet Inspection | |
| Ismail et al. | Understanding Honeypots: Observing Malicious Activities Over Telnet | |
| Kessler et al. | The case for teaching network protocols to computer forensics examiners |