Identification Security at Unauthorized Use of Information System

被引:0
|
作者
Kaur, Navpreet [1 ]
Rao, Dhawaleswar [2 ]
机构
[1] Lovely Profess Univ, Comp Sci & Engn, Phagwara, Punjab, India
[2] Lovely Profess Univ, Phagwara, Punjab, India
关键词
Network Security; Honeypots; Firewall; Intrusion analysis; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is the primary requirement in this era of informationization. Threats and worms are rising with a high degree and penetrating into the system, there is a need of such a security system that should analyze and provide valuable information to the organization. Honeypot provides a technology that adds a layer to the network security and the goal of honeypot is to distract the attacker from real systems and to gain valuable information about them. In comparison to other intrusion detection technologies, Honeypot is far better because it has the ability to detect new attacks and improve the security of the network by using the existing intelligence of the security technologies. Honeypot is designed to get compromised with the new threats and welcome the attackers to attack and analyze their behavior. So, Honeypot is an attractive alternative as it acts as trap to detect the suspicious that breaches the network security.
引用
收藏
页码:72 / 76
页数:5
相关论文
共 50 条
  • [41] The security system for maintenance of the required information security level
    Kiedrowicz, Maciej
    Stanik, Jerzy
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
  • [42] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [43] UNAUTHORIZED USE OF A NEWSPAPERS NAME
    STEVENS, GE
    JOURNALISM QUARTERLY, 1984, 61 (02): : 426 - 429
  • [44] RESPONSIBILITY IN UNAUTHORIZED USE OF SAMPLES
    RIEGER, HJ
    DEUTSCHE MEDIZINISCHE WOCHENSCHRIFT, 1972, 97 (30) : 1135 - &
  • [45] PREVENTING UNAUTHORIZED USE OF SYSTEMS
    MEISSNER, P
    DATA PROCESSING, 1977, 19 (07): : 42 - 43
  • [46] Continued unauthorized use of FACC
    Parmley, WW
    JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY, 1996, 27 (06) : 1543 - 1544
  • [47] Research on Information Security System of Smart City Based on Information Security Requirements
    Dong, Na
    Zhao, Junsan
    Yuan, Lei
    Kong, Yun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [48] The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study
    Kruger, H. A.
    Drevin, L.
    Steyn, T.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 13 - 22
  • [49] A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System
    Alqurashi, Ezzat
    Wills, Gary
    Gilbert, Lester
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 245 - 256
  • [50] Developing a stakeholder identification and analysis technique for use in information system redesign
    Davison, J
    Deeks, D
    Thompson, JB
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS II, 2002, : 541 - 545