International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 3- Issue 5, May 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

LAN Based Intrusion Detection And Alerts

[Full Text]



Vivek Malik, Mohit Jhawar, Harleen, Akshay Khanijau, Nakul Chawla



Index Terms: Honeypots, Honeypot Intrusion Detection System, Honeyd, Intrusion Detection System, Nmap, Port Scanning, System generated e-mail alert



Abstract : With the ever increasing size and number of networks around the world, the network traffic increases even more. The pace at which such an increase is observed, gives a rise to the need of Intrusion Detection exponentially. Under such circumstances, data is vulnerable to its maximum capacity. Intrusion Detection is required to safeguard the public servers from unauthorized access. Filtering of unauthorized access attempts whilst maintaining low latency in order not to interfere and compromise network capacity and bandwidth has become a cause of major concern. Implementation of Intrusion Detection system thus comes into play. It segregates the traffic from authenticated clients and attackers or intruders, while simultaneously ceding the issues of latency, security, bandwidth and throughput of the network. The ever increasing types of computer attacks are getting more and more difficult to identify. Hence the use of honeypots may provide an effective and reliable solution to Intrusion Detection and Alert mechanisms.



[1] https://www.thefreedictionary.com/intrusion

[2] SANS Institute InfoSec Reading Room,”Understanding Intrusion DetectionSystems”,https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337 (2001)

[3] “An Introduction to Intrusion Detection Systems and the Dragon IDS Suite”, http://www.intrusion-detection-system-group.co.uk/

[4] Wayne T Work, "Intrusion Detection Systems - What are they and how they work", Security Gauntlet Consulting 56 Applewood LaneNaugatuck, CT 06770, 203.217.5004, 6/12/2003

[5] Yogendra Kumar Jain, Surabhi Singh, "Honeypot Based Secure Nework", Vol 3 No,2 Feb 2011, ISSN: 0975-3397, pp 612-620

[6] Lance spitzner, "Honeypots: Tracking Hackers", USA:Addison Wesley, 0-321-10895-7, ch 3/4/8, 2002

[7] Jammi Ashok, Y. Raju, S. Munisankariah, "Intrusion Detection Through Honeypots", IJEST10-02-10-055, ISSN: 0975: 5462, pp 5689-5610

[8] Ram Kumar Singh, T. Ramanujan, "Intrusion Detection System Using Advanced Honeypots", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009

[9] Travis Altman, “Honeypot/honeyd tutorial part 1, getting started”, http://travisaltman.com/honeypot-honeyd-tutorial-part-1-getting-started/ (2011)

[10] Travis Altman, “Honeypot/honeyd tutorial part 2, multiple honeypots”, http://travisaltman.com/honeypot-honeyd-tutorial-part-2-multiple-honeypots/ (2011)