Downloads: 123 | Views: 276
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 7 Issue 5, May 2018 | Popularity: 6.4 / 10
Deceptive Attacks and Anomalies Detection Using Honeypot Enabled Networks
Nimitha Mary Mohan, Kalimuthu M
Abstract: In current world, interchanges innovations and leaps forward in data prompt an ever increasing number of gadgets of each possible sort being associated with the Internet. This likewise reinforces the requirement for guarantee against digital assaults. Any gadgets with a remote association could be powerless against harmful hacking attempts. Then, honey pot-based deception mechanism is one of the strategies to guarantee security for present day organizes in the Internet Things. In this paper, safeguarding against attacks in honey pot based systems is finished by taking a glance at a game theoretic model of deception including an attacker and a defender. The attacker may attempt to deceive the safeguard by utilizing diverse kinds of attacks running from a suspicious to an apparently ordinary action, while the defender thus can make utilization of honey pots as an instrument of misleading to trap attackers. .
Keywords: networks, security, honey pot, attacks
Edition: Volume 7 Issue 5, May 2018
Pages: 1672 - 1675
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad