Open Access
Subscription Access
Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN
A honeypot is used in the area of computer and Internet security. It is an information system resource which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Compared to an intrusion detection system; honeypots have the great advantage that they do not generate false alerts because no productive components are running on the system. This fact allows the system to log every byte and to correlate this data with other sources to draw a picture of an attack and the attacker. Traditionally honeypots are connected with end clients to detect the uneven behavior of traffic. Activities such as port scanning can be effectively detected by the weak interaction honeypot but many applications such as packet scanning, pattern scanning cannot be detected by weak honeypots. In our research we will propose a strong honeypot mechanism along with intrusion detection system to achieve maximum security in the wireless network. To achieve the objective of our research we placed the honeypot just after the Firewall and intrusion system have strongly coupled synchronize with honeypot. Monitoring will be done at packet level and pattern level of the traffic. Simulation will filter and monitor traffic for highlight the intrusion in the network.
Keywords
Honeypot.
User
Font Size
Information
Abstract Views: 210
PDF Views: 3