- home
- Advanced Search
Filters
Access
Type
Year range
-chevron_right GO- This year
- Last 5 years
- Last 10 years
Field of Science
Country
Research community
Organization
- Energy Research
- Energy Research
description Publicationkeyboard_double_arrow_right Conference object , Article 2018Publisher:IEEE Authors: Neeraj Bhagat; Bhavna Arora;Security of network becomes primary importance of every organization to protect it from any kind of cyber attack. For this, the analysis of traffic that travels in the network is an imperative task. Traffic analysis on network is done by installing various network intrusion detection (NID) devices. One of a very vital device for detecting network intrusions is a Honeypot. Honeypots interact with the attacker and collect the data which can be analyzed to retrieve information regarding the attacks and attacker in the network. Honeypots are security resources that are targeted by the attacker and generate data logs of the attacks. Honeypots provide relevant data in a small quantity so that security researchers could easily understand and the analysis of the data becomes feasible. In this paper honeypot is simulated to interact with attackers and the data collected by using honeypot is analyzed using various tools.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/pdgc.2018.8745761&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu8 citations 8 popularity Top 10% influence Average impulse Average Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/pdgc.2018.8745761&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
description Publicationkeyboard_double_arrow_right Conference object , Article 2018Publisher:IEEE Authors: Neeraj Bhagat; Bhavna Arora;Security of network becomes primary importance of every organization to protect it from any kind of cyber attack. For this, the analysis of traffic that travels in the network is an imperative task. Traffic analysis on network is done by installing various network intrusion detection (NID) devices. One of a very vital device for detecting network intrusions is a Honeypot. Honeypots interact with the attacker and collect the data which can be analyzed to retrieve information regarding the attacks and attacker in the network. Honeypots are security resources that are targeted by the attacker and generate data logs of the attacks. Honeypots provide relevant data in a small quantity so that security researchers could easily understand and the analysis of the data becomes feasible. In this paper honeypot is simulated to interact with attackers and the data collected by using honeypot is analyzed using various tools.
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/pdgc.2018.8745761&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu8 citations 8 popularity Top 10% influence Average impulse Average Powered by BIP!
more_vert add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/pdgc.2018.8745761&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu