Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Honeypot Based Intrusion Detection System

Lingua IngleseInglese
Libro In brossura
Libro Honeypot Based Intrusion Detection System Abhay Nath Singh
Codice Libristo: 07091208
Casa editrice LAP Lambert Academic Publishing, novembre 2011
The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from un... Descrizione completa
? points 132 b
55.97
Presso l'editore su ordinazione Inviamo tra 3-5 giorni

30 giorni per il reso


Potrebbe interessarti anche


Der Cellokasten Michael Dartsch / Foglio
common.buy 39.17
His Majesty's Indian Allies Robert Allen / In brossura
common.buy 25.25
Goal-getter Michael Hardcastle / In brossura
common.buy 8.34
Educational Inclusion Graham Foster / In brossura
common.buy 84.55
Con Cristo en el tercer milenio Raniero Cantalamessa / In brossura
common.buy 19.36
Apache Lawman Phil Dunlap / In brossura
common.buy 18.19
Future Is in the Stars Cleveland Carter / In brossura
common.buy 16.80
Fuzzy Logic in Its 50th Year Cengiz Kahraman / Rigido
common.buy 143.32

The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators.

Informazioni sul libro

Titolo completo Honeypot Based Intrusion Detection System
Lingua Inglese
Rilegatura Libro - In brossura
Data di pubblicazione 2012
Numero di pagine 68
EAN 9783846583104
Codice Libristo 07091208
Peso 121
Dimensioni 149 x 221 x 10
Regala questo libro oggi stesso
È facile
1 Aggiungi il libro al carrello e scegli la consegna come regalo 2 Ti invieremo subito il buono 3 Il libro arriverà all'indirizzo del destinatario

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo