Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Author ORCID
arrow_drop_down
is
arrow_drop_down

Filters

  • Access
  • Type
  • Year range
  • Field of Science
  • Country
  • Research community
  • Organization
The following results are related to Energy Research. Are you interested to view more results? Visit OpenAIRE - Explore.
1 Research products
Relevance
arrow_drop_down
unfold_lessCompact results

  • Energy Research

  • Authors: Neeraj Bhagat; Bhavna Arora;

    Security of network becomes primary importance of every organization to protect it from any kind of cyber attack. For this, the analysis of traffic that travels in the network is an imperative task. Traffic analysis on network is done by installing various network intrusion detection (NID) devices. One of a very vital device for detecting network intrusions is a Honeypot. Honeypots interact with the attacker and collect the data which can be analyzed to retrieve information regarding the attacks and attacker in the network. Honeypots are security resources that are targeted by the attacker and generate data logs of the attacks. Honeypots provide relevant data in a small quantity so that security researchers could easily understand and the analysis of the data becomes feasible. In this paper honeypot is simulated to interact with attackers and the data collected by using honeypot is analyzed using various tools.

    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    8
    citations8
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
Powered by OpenAIRE graph
Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Author ORCID
arrow_drop_down
is
arrow_drop_down
The following results are related to Energy Research. Are you interested to view more results? Visit OpenAIRE - Explore.
1 Research products
  • Authors: Neeraj Bhagat; Bhavna Arora;

    Security of network becomes primary importance of every organization to protect it from any kind of cyber attack. For this, the analysis of traffic that travels in the network is an imperative task. Traffic analysis on network is done by installing various network intrusion detection (NID) devices. One of a very vital device for detecting network intrusions is a Honeypot. Honeypots interact with the attacker and collect the data which can be analyzed to retrieve information regarding the attacks and attacker in the network. Honeypots are security resources that are targeted by the attacker and generate data logs of the attacks. Honeypots provide relevant data in a small quantity so that security researchers could easily understand and the analysis of the data becomes feasible. In this paper honeypot is simulated to interact with attackers and the data collected by using honeypot is analyzed using various tools.

    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    8
    citations8
    popularityTop 10%
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
Powered by OpenAIRE graph