{"title":"Kali Linux下基于树莓派蜜罐的入侵检测系统增强网络安全","authors":"June Jeremiah","doi":"10.1109/ICoCSec47621.2019.8971117","DOIUrl":null,"url":null,"abstract":"In this ever-changing digital connected world of Internet of Things (IoT) and new innovative technologies of software and application developments, cyber security has drastically changed and become critical issue for individuals and businesses globally. Security is one of the critical requirements in today’s world where by network devices are connected together and easily accessible anytime anywhere. Data integrity and protecting access of information between connected devices is the basic need to secure today cyber space. This paper aims at implementation of a decoy based technology, Honeypot along with a Raspberry Pi to enhance network security by simulating weak security and vulnerabilities to attract attackers. The Honeypot will monitor and record all the malicious activities launched by the attacker, the data will be used for security auditing to improve security where needed easily and cost effectively.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Intrusion Detection System to Enhance Network Security Using Raspberry PI Honeypot in Kali Linux\",\"authors\":\"June Jeremiah\",\"doi\":\"10.1109/ICoCSec47621.2019.8971117\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this ever-changing digital connected world of Internet of Things (IoT) and new innovative technologies of software and application developments, cyber security has drastically changed and become critical issue for individuals and businesses globally. Security is one of the critical requirements in today’s world where by network devices are connected together and easily accessible anytime anywhere. Data integrity and protecting access of information between connected devices is the basic need to secure today cyber space. This paper aims at implementation of a decoy based technology, Honeypot along with a Raspberry Pi to enhance network security by simulating weak security and vulnerabilities to attract attackers. The Honeypot will monitor and record all the malicious activities launched by the attacker, the data will be used for security auditing to improve security where needed easily and cost effectively.\",\"PeriodicalId\":272402,\"journal\":{\"name\":\"2019 International Conference on Cybersecurity (ICoCSec)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cybersecurity (ICoCSec)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICoCSec47621.2019.8971117\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cybersecurity (ICoCSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoCSec47621.2019.8971117","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection System to Enhance Network Security Using Raspberry PI Honeypot in Kali Linux
In this ever-changing digital connected world of Internet of Things (IoT) and new innovative technologies of software and application developments, cyber security has drastically changed and become critical issue for individuals and businesses globally. Security is one of the critical requirements in today’s world where by network devices are connected together and easily accessible anytime anywhere. Data integrity and protecting access of information between connected devices is the basic need to secure today cyber space. This paper aims at implementation of a decoy based technology, Honeypot along with a Raspberry Pi to enhance network security by simulating weak security and vulnerabilities to attract attackers. The Honeypot will monitor and record all the malicious activities launched by the attacker, the data will be used for security auditing to improve security where needed easily and cost effectively.