Identification Security at Unauthorized Use of Information System

被引:0
|
作者
Kaur, Navpreet [1 ]
Rao, Dhawaleswar [2 ]
机构
[1] Lovely Profess Univ, Comp Sci & Engn, Phagwara, Punjab, India
[2] Lovely Profess Univ, Phagwara, Punjab, India
关键词
Network Security; Honeypots; Firewall; Intrusion analysis; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is the primary requirement in this era of informationization. Threats and worms are rising with a high degree and penetrating into the system, there is a need of such a security system that should analyze and provide valuable information to the organization. Honeypot provides a technology that adds a layer to the network security and the goal of honeypot is to distract the attacker from real systems and to gain valuable information about them. In comparison to other intrusion detection technologies, Honeypot is far better because it has the ability to detect new attacks and improve the security of the network by using the existing intelligence of the security technologies. Honeypot is designed to get compromised with the new threats and welcome the attackers to attack and analyze their behavior. So, Honeypot is an attractive alternative as it acts as trap to detect the suspicious that breaches the network security.
引用
收藏
页码:72 / 76
页数:5
相关论文
共 50 条
  • [31] Information Security and System Development
    Stoll, Margareth
    Laner, Dietmar
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 35 - 40
  • [32] INFORMATION-SYSTEM SECURITY
    OCCHINI, G
    ELETTROTECNICA, 1981, 68 (12): : 1051 - 1063
  • [34] Implementation of security information system
    Cui, JS
    Li, TK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 42 - 47
  • [35] Information security in the LRIT system
    Niski, R.
    Waraksa, M.
    Zurek, J.
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 531 - +
  • [36] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [37] THE USE OF BELIEF FUNCTION THEORY WITHIN THE AUDIT OF AN INFORMATION SECURITY MANAGEMENT SYSTEM
    Beranek, Ladislav
    ICT FOR COMPETITIVENESS 2012, 2012, : 17 - 24
  • [38] THE LEVEL OF SECURITY AGAINST UNAUTHORIZED ACCESS AS A KEY INDICATOR OF THE QUALITY OF THE REMOTE BANKING SYSTEM
    Vizgunov, A. N.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2010, 12 (02): : 37 - 45
  • [39] A Security Audit Framework to Manage Information System Security
    Pereira, Teresa
    Santos, Henrique
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 9 - +
  • [40] PROTECTION FROM UNAUTHORIZED ACCESS TO INFORMATION IN AN ADAPTIVE-CONTROL SYSTEM WITH IDENTIFIER
    DYNKIN, VN
    MUSAELYAN, SS
    RAIBMAN, NS
    AUTOMATION AND REMOTE CONTROL, 1982, 43 (04) : 534 - 538