Honeypot Based Intrusion Detection System: A framework for mitigating network attacks using honeypot and real time rule accession in Intrusion Detection System

 
9783846583104: Honeypot Based Intrusion Detection System: A framework for mitigating network attacks using honeypot and real time rule accession in Intrusion Detection System
View all copies of this ISBN edition:
 
 

The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators.

"synopsis" may belong to another edition of this title.

About the Author:

Abhay Nath Singh obtained his master’s degree in Computer Science from Indian Institute of Technology - Roorkee in 2011. He has worked in the fields of network security, distributed and real-time database systems. He is the author of several papers in reputed international conferences, international journals and book chapter.

"About this title" may belong to another edition of this title.

Buy New View Book
List Price: US$ 65.00
US$ 54.30

Convert currency

Shipping: US$ 3.51
From Germany to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

1.

Singh, Abhay Nath
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Quantity Available: 1
Seller:
Rating
[?]

Book Description Condition: New. Publisher/Verlag: LAP Lambert Academic Publishing | A framework for mitigating network attacks using honeypot and real time rule accession in Intrusion Detection System | The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators. | Format: Paperback | Language/Sprache: english | 68 pp. Seller Inventory # K9783846583104

More information about this seller | Contact this seller

Buy New
US$ 54.30
Convert currency

Add to Basket

Shipping: US$ 3.51
From Germany to U.S.A.
Destination, rates & speeds

2.

Abhay Nath Singh
Published by LAP Lambert Academic Publishing Feb 2012 (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Taschenbuch Quantity Available: 1
Seller:
BuchWeltWeit Inh. Ludwig Meier e.K.
(Bergisch Gladbach, Germany)
Rating
[?]

Book Description LAP Lambert Academic Publishing Feb 2012, 2012. Taschenbuch. Condition: Neu. Neuware - The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators. 68 pp. Englisch. Seller Inventory # 9783846583104

More information about this seller | Contact this seller

Buy New
US$ 59.32
Convert currency

Add to Basket

Shipping: US$ 20.13
From Germany to U.S.A.
Destination, rates & speeds

3.

Abhay Nath Singh
Published by LAP Lambert Academic Publishing Feb 2012 (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Taschenbuch Quantity Available: 1
Seller:
Rheinberg-Buch
(Bergisch Gladbach, Germany)
Rating
[?]

Book Description LAP Lambert Academic Publishing Feb 2012, 2012. Taschenbuch. Condition: Neu. Neuware - The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators. 68 pp. Englisch. Seller Inventory # 9783846583104

More information about this seller | Contact this seller

Buy New
US$ 59.32
Convert currency

Add to Basket

Shipping: US$ 20.13
From Germany to U.S.A.
Destination, rates & speeds

4.

Abhay Nath Singh
Published by LAP Lambert Academic Publishing, Germany (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Paperback Quantity Available: 1
Seller:
The Book Depository EURO
(London, United Kingdom)
Rating
[?]

Book Description LAP Lambert Academic Publishing, Germany, 2012. Paperback. Condition: New. Aufl.. Language: English . Brand New Book. The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators. Seller Inventory # KNV9783846583104

More information about this seller | Contact this seller

Buy New
US$ 88.96
Convert currency

Add to Basket

Shipping: US$ 3.93
From United Kingdom to U.S.A.
Destination, rates & speeds

5.

Abhay Nath Singh
Published by LAP Lambert Academic Publishing Feb 2012 (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Taschenbuch Quantity Available: 1
Print on Demand
Seller:
AHA-BUCH GmbH
(Einbeck, Germany)
Rating
[?]

Book Description LAP Lambert Academic Publishing Feb 2012, 2012. Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Neuware - The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori algorithm for association rule mining is used on the data logged by honeypot to generate rules which is added to the Snort IDS dynamically. This is different from the previous method of off-line rule base addition. The proposed IDS is efficient in detecting the attacks at the time of their occurrences even if the system was not equipped with rules to detect it. The logs generated by honeypots can grow very large in size when there is heavy attack traffic in the system, thus consuming a lot of disk space. The huge log size poses difficulty when they are processed and analyzed as they consume a lot of time and resources. The proposed system addresses these issues. The logging module for efficient capture of attack traffic saves disk space. The log analyzer processes this log to generate reports and graphs for the security administrators. 68 pp. Englisch. Seller Inventory # 9783846583104

More information about this seller | Contact this seller

Buy New
US$ 59.32
Convert currency

Add to Basket

Shipping: US$ 34.67
From Germany to U.S.A.
Destination, rates & speeds

6.

Abhay Nath Singh
Published by LAP LAMBERT Academic Publishing (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Softcover Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)
Rating
[?]

Book Description LAP LAMBERT Academic Publishing, 2012. Condition: New. book. Seller Inventory # MB011YTXPKC

More information about this seller | Contact this seller

Buy New
US$ 103.68
Convert currency

Add to Basket

Shipping: US$ 3.27
Within U.S.A.
Destination, rates & speeds

7.

Abhay Nath Singh
Published by LAP LAMBERT Academic Publishing (2012)
ISBN 10: 3846583103 ISBN 13: 9783846583104
New Paperback Quantity Available: 1
Seller:
Books Express
(Portsmouth, NH, U.S.A.)
Rating
[?]

Book Description LAP LAMBERT Academic Publishing, 2012. Paperback. Condition: New. Ships with Tracking Number! INTERNATIONAL WORLDWIDE Shipping available. Buy with confidence, excellent customer service!. Seller Inventory # 3846583103n

More information about this seller | Contact this seller

Buy New
US$ 221.21
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds