Open Access Open Access  Restricted Access Subscription Access

Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN


Affiliations
1 C.S.E. Deptt., GZS PTU Campus, Bathinda, India
 

A honeypot is used in the area of computer and Internet security. It is an information system resource which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Compared to an intrusion detection system; honeypots have the great advantage that they do not generate false alerts because no productive components are running on the system. This fact allows the system to log every byte and to correlate this data with other sources to draw a picture of an attack and the attacker. Traditionally honeypots are connected with end clients to detect the uneven behavior of traffic. Activities such as port scanning can be effectively detected by the weak interaction honeypot but many applications such as packet scanning, pattern scanning cannot be detected by weak honeypots. In our research we will propose a strong honeypot mechanism along with intrusion detection system to achieve maximum security in the wireless network. To achieve the objective of our research we placed the honeypot just after the Firewall and intrusion system have strongly coupled synchronize with honeypot. Monitoring will be done at packet level and pattern level of the traffic. Simulation will filter and monitor traffic for highlight the intrusion in the network.

Keywords

Honeypot.
User
Notifications
Font Size

Abstract Views: 210

PDF Views: 3




  • Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN

Abstract Views: 210  |  PDF Views: 3

Authors

Amandeep Singh
C.S.E. Deptt., GZS PTU Campus, Bathinda, India
Pankush Singla
C.S.E. Deptt., GZS PTU Campus, Bathinda, India
Navdeep Kaur Khiva
C.S.E. Deptt., GZS PTU Campus, Bathinda, India

Abstract


A honeypot is used in the area of computer and Internet security. It is an information system resource which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Compared to an intrusion detection system; honeypots have the great advantage that they do not generate false alerts because no productive components are running on the system. This fact allows the system to log every byte and to correlate this data with other sources to draw a picture of an attack and the attacker. Traditionally honeypots are connected with end clients to detect the uneven behavior of traffic. Activities such as port scanning can be effectively detected by the weak interaction honeypot but many applications such as packet scanning, pattern scanning cannot be detected by weak honeypots. In our research we will propose a strong honeypot mechanism along with intrusion detection system to achieve maximum security in the wireless network. To achieve the objective of our research we placed the honeypot just after the Firewall and intrusion system have strongly coupled synchronize with honeypot. Monitoring will be done at packet level and pattern level of the traffic. Simulation will filter and monitor traffic for highlight the intrusion in the network.

Keywords


Honeypot.