Loading

Design and Develop a Honeypot for Small Scale Organization
Gurleen Singh1, Sakshi Sharma2, Prabhdeep Singh3

1Sakshi Sharma, Department of Computer Science & Engineering (Networking System), Punjab Technical university, Kapurthala, India.
2Gurleen Singh, Department of Computer Science & Engineering (Networking System), Punjab Technical University, Kapurthala, India.
3Prabhdeep Singh, Department of Computer Science & Engineering, Punjab Technical University, Kapurthala, India.

Manuscript received on 07 February 2013 | Revised Manuscript received on 21 February 2013 | Manuscript Published on 28 February 2013 | PP: 170-174 | Volume-2 Issue-3, February 2013 | Retrieval Number: C0455022313/2013©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (IDS) is used for monitoring the processes on a system or a network for examining the threats and alerts the administrator about attack. And IDS provide a solution only for the large scale industries, but there is no solution for the small scale industries so model is proposed for honeypot to solve the problem of small scale industries which is the hybrid structure of Snort, Nmap, Xprobe2, P0f. This model captures the activities of attackers and maintains a log for all these activities. Virtualization is performed with the help of virtual machine. The focus of this paper is primarily on preventing the attacks from external and internal attackers and maintaining the log file using honeypot with virtual machine.
Keywords: Intrusion detection system, honeypots, attacker, security.

Scope of the Article: Computer Network