Article,

Identifying the Misbehaving User in a Network and Trapping them using Honeypot

, and .
International Journal of Innovative Science and Modern Engineering (IJISME), 2 (6): 14-17 (May 2014)

Abstract

In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.

Tags

Users

  • @ijisme_beiesp

Comments and Reviewsshow / hide

  • @ijisme_beiesp
    3 years ago (last updated 3 years ago)
    good
Please log in to take part in the discussion (add own reviews or comments).