Identification Security at Unauthorized Use of Information System

被引:0
|
作者
Kaur, Navpreet [1 ]
Rao, Dhawaleswar [2 ]
机构
[1] Lovely Profess Univ, Comp Sci & Engn, Phagwara, Punjab, India
[2] Lovely Profess Univ, Phagwara, Punjab, India
关键词
Network Security; Honeypots; Firewall; Intrusion analysis; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is the primary requirement in this era of informationization. Threats and worms are rising with a high degree and penetrating into the system, there is a need of such a security system that should analyze and provide valuable information to the organization. Honeypot provides a technology that adds a layer to the network security and the goal of honeypot is to distract the attacker from real systems and to gain valuable information about them. In comparison to other intrusion detection technologies, Honeypot is far better because it has the ability to detect new attacks and improve the security of the network by using the existing intelligence of the security technologies. Honeypot is designed to get compromised with the new threats and welcome the attackers to attack and analyze their behavior. So, Honeypot is an attractive alternative as it acts as trap to detect the suspicious that breaches the network security.
引用
收藏
页码:72 / 76
页数:5
相关论文
共 50 条
  • [1] System Identification under Information Security
    Xu, Changbao
    Zhao, Yanlong
    Zhang, Ji-Feng
    Qi, Hongsheng
    IFAC PAPERSONLINE, 2017, 50 (01): : 3756 - 3761
  • [2] ANALYSIS OF THE RESULTS OF SIMULATION MODELING OF THE INFORMATION SECURITY SYSTEM AGAINST UNAUTHORIZED ACCESS IN SERVICE NETWORKS
    Ismailov, B. G.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2024, (02) : 34 - 44
  • [3] CALLBACK SECURITY SYSTEM PREVENTS UNAUTHORIZED COMPUTER ACCESS
    SMITH, J
    MINI-MICRO SYSTEMS, 1984, 17 (09): : 257 - &
  • [4] Optical security system for the protection of personal identification information
    Doh, YH
    Yoon, JS
    Choi, KH
    Alam, MS
    APPLIED OPTICS, 2005, 44 (05) : 742 - 750
  • [5] MODELING THE SECURITY POLICY OF THE INFORMATION SYSTEM FOR CRITICAL USE
    Bisikalo, O. V.
    Kovtun, V. V.
    Yukhimchuk, M. S.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2019, (01) : 132 - 149
  • [6] USE OF AUXILIARY INFORMATION IN SYSTEM-IDENTIFICATION
    ESKINAT, E
    JOHNSON, SH
    LUYBEN, WL
    INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 1993, 32 (09) : 1981 - 1992
  • [7] Use of Security Patterns for Development of Secure Healthcare Information System
    Maher, Zulfikar Ahmed
    Sani, Nor Fazlida Mohd
    Din, Jamilah
    Jabar, Marzanah A.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2016, 6 (06) : 1541 - 1547
  • [8] Internet of Things Information System Security for Smart Devices Identification and Authentication
    Savukynas, Raimundas
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 168 - 172
  • [9] A New Method for the Identification of Proactive Information Security Management System Metrics
    Hajdarevic, Kemal
    Allen, Pat
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1121 - 1126
  • [10] Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
    Mikuletic, Samanta
    Vrhovec, Simon
    Skela-Savic, Brigita
    Zvanut, Bostjan
    COMPUTERS & SECURITY, 2024, 136