+

Misra et al. - Google Patents

Design of Network Forensic System Based on Honeynet

Misra et al.

View PDF
Document ID
8437711609258909248
Author
Misra R
Dhir R
Publication venue
Int. J. Innov. Eng. Technol

External Links

Snippet

Network forensics deals with the capturing and analysis of the trace and logs of network intrusions from the multiple systems for providing the information to characterize intrusion or features. This paper demonstrates the internal working of implementation of server honeypot …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Sharafaldin et al. Towards a reliable intrusion detection benchmark dataset
JP7250703B2 (en) Assessment and remediation of correlation-driven threats
Pilli et al. Network forensic frameworks: Survey and research challenges
Hunt et al. Network forensics: an analysis of techniques, tools, and trends
Sinchana et al. Performance evaluation and analysis of various network security tools
Alsharabi et al. Detecting unusual activities in local network using snort and wireshark tools
Soepeno Wireshark: An Effective Tool for Network Analysis
Atri et al. Optimization of Network Mapping for Screening and Intrusion Sensing Devices
Kaushik et al. Network forensic system for port scanning attack
Mishra et al. The Role of Wireshark in Packet Inspection and Password Sniffing for Network Security
Joshi et al. Network forensic tools
Sharma Honeypots in Network Security
Paravathi et al. Packet sniffing
Dagdee et al. Intrusion attack pattern analysis and signature extraction for web services using honeypots
Ogbu et al. Intranet security using a LAN packet sniffer to monitor traffic
Mathas et al. Reconnaissance
Misra et al. Design of Network Forensic System Based on Honeynet
Kaur et al. Design & implementation of Linux based network forensic system using Honeynet
Bhuyan et al. Practical tools for attackers and defenders
Hubballi et al. Event Log Analysis and Correlation: A Digital Forensic Perspective
Clementschitsch Flowbreaker: Enriched Descriptions of Network Traffic Captures
Biswas et al. Network Forensics Analysis
Patil Securing Remote access communications using Deep packet Inspection
Ismail et al. Understanding Honeypots: Observing Malicious Activities Over Telnet
Kessler et al. The case for teaching network protocols to computer forensics examiners
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载