Identifying the Misbehaving User in a Network and Trapping them using Honeypot
Praveen J U1, P Jayarekha2
1Praveen J U, Information Science, BMSCE, Bangalore, India.
2Dr. Jayarekha P, Information Science, BMSCE, Bangalore, India.
Manuscript received on May 05, 2014. | Revised Manuscript received on May 11, 2014. | Manuscript published on May 15, 2014. | PP: 14-17 | Volume-2 Issue-6, May 2014. | Retrieval Number: F0663052614/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In the IT world, information is considered to be the most valuable asset for any organization. The ability to secure this asset is the critical factor and the art of securing this asset is known as information security. In today’s competing IT business, network administrator must be always available to protect the network and the information on the network with extreme measures. One of them is honeypot. Honeypot reduces the overhead of the network administrator to always be on the network and always monitoring it. Honeypot is a setup to imitate a real network. The idea is to make the attacker believe that the honeypot is a legitimate system. This Paper proposes the methodology to identify and trap the misbehaving user.
Keywords: PM(pseudonym manager), (NM)nymble manager, NIDS(Network Intrusion Detection System), TG(Ticket Generator), TM(Ticket Manager).