A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Khiva, Navdeep Kaur
- Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN
Authors
1 C.S.E. Deptt., GZS PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 101-106Abstract
A honeypot is used in the area of computer and Internet security. It is an information system resource which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Compared to an intrusion detection system; honeypots have the great advantage that they do not generate false alerts because no productive components are running on the system. This fact allows the system to log every byte and to correlate this data with other sources to draw a picture of an attack and the attacker. Traditionally honeypots are connected with end clients to detect the uneven behavior of traffic. Activities such as port scanning can be effectively detected by the weak interaction honeypot but many applications such as packet scanning, pattern scanning cannot be detected by weak honeypots. In our research we will propose a strong honeypot mechanism along with intrusion detection system to achieve maximum security in the wireless network. To achieve the objective of our research we placed the honeypot just after the Firewall and intrusion system have strongly coupled synchronize with honeypot. Monitoring will be done at packet level and pattern level of the traffic. Simulation will filter and monitor traffic for highlight the intrusion in the network.Keywords
Honeypot.- Review of Privacy Preserving Architectures in Cloud Computing
Authors
1 Deptt. of Computer Science and Engineering, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 118-126Abstract
Cloud computing is a technique in which data has to be transmitted across the internet from one point to another. Since the data is free of the transmission, there is a high possibility that the data sent across may be lost or be attacked by intruders, so the privacy among the data is to be maintained for secure transmission.
Privacy in cloud computing is the ability of a user or a business to control what information they reveal about themselves over the cloud or to a cloud service provider, and the ability to control who can access that information. Numerous existing privacy laws impose the standards for the collection, maintenance, use, and disclosure of personal information that must be satisfied by cloud providers. Cloud Service Providers can store information at multiple locations or outsource it, then it is very difficult to determine, how secure it is and who has access to it.
Cloud computing is a revolutionary computing paradigm which enables flexible, on demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. The privacy problem of cloud computing is yet to be solved effectively.
In this paper, I reviewed many research papers to check how many privacy preserving architectures exists and how they are preserving the data.