To Design an Intrusion Detection System based on Honeypot using Mobile Agent and IP Traceback Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013

To Design an Intrusion Detection System based on Honeypot using Mobile Agent and IP Traceback Technique

Surabhi Thukral, Rutba Maqsood, Divya Upadhyay

Network security technology has become crucial in protecting government and industry computing infrastructure. . In recent years, intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behaviour in a changing environment. Still, significant challenges exist in design and implementation of production quality IDSs. There are various problems which the existing intrusion detection system models have, such as more significant network transmission load, lower detection efficiency, and limited data process ability. This paper presents an intrusion detection module based on honeypot technology, which utilizes IP Traceback technique and mobile agents. By using the mobile agents, this module has the capability of distributed detection and response. By the use of honeypot technology the intrusion source can be traced to the farthest.

Keywords: Mobile Agents, Honeypot technology, Intrusion Detection, IP Traceback

Edition: Volume 2 Issue 4, April 2013

Pages: 196 - 199

Share this Article

How to Cite this Article?

Surabhi Thukral, Rutba Maqsood, Divya Upadhyay, "To Design an Intrusion Detection System based on Honeypot using Mobile Agent and IP Traceback Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013166, Volume 2 Issue 4, April 2013, 196 - 199

149 PDF Views | 125 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Agents'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1709 - 1713

Rider: A Multi Layer Framework for Road Condition Estimation

Sona P, Divya M

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2253 - 2256

A Detailed Anatomization of Mobile Agents

Payal Beniwal, Dr. Mukesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1314 - 1317

An Overview of Content Based Image Retrieval System using Mobile Agent

Yogita B. Verulkar, Bharat K. Chaudhari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 967 - 972

Fault Tolerance in Mobile Computing using Multi Agent Environment for Electronic-Business Applications

Shiv Kumar, Shrawan Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 788 - 791

Study of Execution Mechanism of Intelligent Mobile Agents

Sanjay Yede, Dr. V. N. Chavan

Share this Article

Similar Articles with Keyword 'Honeypot technology'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 196 - 199

To Design an Intrusion Detection System based on Honeypot using Mobile Agent and IP Traceback Technique

Surabhi Thukral, Rutba Maqsood, Divya Upadhyay

Share this Article

Similar Articles with Keyword 'Intrusion Detection'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Similar Articles with Keyword 'IP Traceback'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1013 - 1017

Reveal IP Spoofers Location from Route Backscatter and Passive IP Traceback

Akshay Dilip Homkar, S. D. Satav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 194 - 197

A Survey on Novel Flow Marking IP Traceback Schemes

S. M. Chaware, Shubhangi R. Sardar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article
Top