..

Журнал компьютерных наук и системной биологии

Отправить рукопись arrow_forward arrow_forward ..

The Use of Honeynets to Detect Exploited Systems Across the Wireless Networks

Abstract

Mahmood I

Any to internet is target of hackers and intruders. Every organization/institution system connected uses some kind of network security software to protect its data from unauthorized use. Software’s used by organization/institution are antivirus firewall etc. There are many types of services that are run on organization/institution networks and it is important to detect intrusion. Due to large bandwidth, monitoring is very hard and impossible. In developing, where the cyber-crimes are very easy to commit and there are not very strong lows Honeynet scheme, is use to help system administrator in detecting intrusion or malicious content. Honey net is so proposed solution because it helps in understanding the intention and ways attacker use to compromise security systems. In this paper a basic honeynet framework is proposed.

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Поделиться этой статьей

Индексировано в

arrow_upward arrow_upward