Performance Analysis of Honeypots Against Flooding Attack

Vasudha Mahajan, Jaspreet Singh
{"title":"Performance Analysis of Honeypots Against Flooding Attack","authors":"Vasudha Mahajan, Jaspreet Singh","doi":"10.1109/ICECA55336.2022.10009485","DOIUrl":null,"url":null,"abstract":"Internet security is of the utmost importance to both consumers and organizations due to the massive risk of attack by malicious hackers. In order to increase internet security implementation of a honeypot system is one way. These honey pots are deployed by businesses and government agencies to identify the extent of network intrusions. A honeypot may be used as a reliable security forensic tool to reduce the risk of intrusions and by exposing potential system security gaps. This comprehensive study gives a concise overview of honeypots and attacks, showing honeypot as an efficient strategy for boosting internet security and a safeguard to our systems. This paper intends to test the honeypot system against syn flooding attack using a pentbox honeypot, allowing to record intrusion attempts and to analyze the attack effectiveness. Honeypot works as a cutting-edge security monitoring tool to reduce the risk of attacks on computer networks and are helpful in revealing important information about possible system security flaws.","PeriodicalId":356949,"journal":{"name":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA55336.2022.10009485","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Internet security is of the utmost importance to both consumers and organizations due to the massive risk of attack by malicious hackers. In order to increase internet security implementation of a honeypot system is one way. These honey pots are deployed by businesses and government agencies to identify the extent of network intrusions. A honeypot may be used as a reliable security forensic tool to reduce the risk of intrusions and by exposing potential system security gaps. This comprehensive study gives a concise overview of honeypots and attacks, showing honeypot as an efficient strategy for boosting internet security and a safeguard to our systems. This paper intends to test the honeypot system against syn flooding attack using a pentbox honeypot, allowing to record intrusion attempts and to analyze the attack effectiveness. Honeypot works as a cutting-edge security monitoring tool to reduce the risk of attacks on computer networks and are helpful in revealing important information about possible system security flaws.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
蜜罐抗洪水攻击性能分析
由于受到恶意黑客攻击的巨大风险,网络安全对消费者和组织都至关重要。为了提高互联网的安全性,蜜罐系统的实施是一种方法。企业和政府机构部署了这些蜜罐,以确定网络入侵的程度。蜜罐可以用作可靠的安全取证工具,以减少入侵风险,并暴露潜在的系统安全漏洞。这项全面的研究给出了蜜罐和攻击的简要概述,表明蜜罐是提高互联网安全和保护我们系统的有效策略。本文拟采用五角形蜜罐对该蜜罐系统进行syn泛洪攻击测试,记录入侵企图,分析攻击效果。蜜罐是一种尖端的安全监控工具,可以降低计算机网络受到攻击的风险,并有助于揭示有关可能存在的系统安全漏洞的重要信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multi-Objective Artificial Flora Algorithm Based Optimal Handover Scheme for LTE-Advanced Networks Named Entity Recognition using CRF with Active Learning Algorithm in English Texts FPGA Implementation of Lattice-Wave Half-Order Digital Integrator using Radix-$2^{r}$ Digit Recoding Green Cloud Computing- Next Step Towards Eco-friendly Work Stations Diabetes Prediction using Support Vector Machine, Naive Bayes and Random Forest Machine Learning Models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1