Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot

Print
PDF
IJCA Proceedings on National Conference on Contemporary Computing
© 2017 by IJCA Journal
NCCC 2016 - Number 1
Year of Publication: 2017
Authors:
Juhi Khan
Rajesh Kumar Chakrawarti

Juhi Khan and Rajesh Kumar Chakrawarti. Article: Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot. IJCA Proceedings on National Conference on Contemporary Computing NCCC 2016(1):15-18, April 2017. Full text available. BibTeX

@article{key:article,
	author = {Juhi Khan and Rajesh Kumar Chakrawarti},
	title = {Article: Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot},
	journal = {IJCA Proceedings on National Conference on Contemporary Computing},
	year = {2017},
	volume = {NCCC 2016},
	number = {1},
	pages = {15-18},
	month = {April},
	note = {Full text available}
}

Abstract

Network forensic is a technique for diagnose, association, examine, separating and collection of digital proof from multiple sources for the purpose of accumulate the reason of attacks and try to recover the data and information and tracking of criminals. Network forensic is a grimy process that involves the collection of different evidence through various sources. In Today's world, the large volume of data and major information are transported and relocate from one place to another's electronically through networks. In networks, there were many malicious activities and attackers are performed. It plays a vital role in process of battle against cyber crime and uncertified hacking process. So, In this paper Author adopts some procedure, tools and mechanism to expose or analyzing network intruders and retrieval of information through various implementations and they are mainly focusing in honey-pot which is created with the help of honey-d for gathering data about internal and external invader in which result was collected over the 4 weeks period and server side code which is treated as real server for collecting information about intruders. At the same time organize safety is compact, and the current attempt to implant well-being is for the most part taking into account the known truths of the aloof assurance model. IDs is a originate system security in view of active protection changes

References

  • A. Almulhem, "Network forensics: Notions and challenges" Dec 14-17, 2014.
  • D. Akkaya and F. Thalgott, Honey-pots in Network Security, Linnaeus University, Sweden, 2015.
  • F. Raynal, D. Kaminsky, P. Biondi, and Y. Berthier, "Honey pot forensics, Part I: Analyzing the network, "IEEE Security & Privacy
  • F. Raynal, D. Kaminsky, P. Biondi,and Y. Berthier, "Honey pot forensics, Part II: Analyzing the network, "IEEE Security
  • S. David off and J. Ham. Network Forensics Tracking Hackers through Cyberspace, USA: Pearson 2012.
  • K. Scarfone and P. Mell. "Guide to intrusion detection and prevention systems (IDPS)," NIST Special Publication, 2007
  • N. Provosand and T. Holz, Virtual Honey pots: From boot net Tracking to Intrusion Detection, 1st ed. Boston, and USA: Addison Wesley Professional, 2007.
  • T. Grudziecki et al. , "Proactive detection of security and incidents," Document Report, ENISA, 2012. A. Nyre, "Increasing survivability by dynamic.
  • Deployment of honey pots," M. S. thesis, Dept. of Telematics, Univ. of Science and Technology, Norwegian, 2005.
  • H. Artail, H. Safab, M. Sraj, I. Kuwatly, Z. AlMasri, Intrusion detection systems in protecting organizational networks," Network Security.
  • N. Meghanathan, S. Allam, and L. Moore, "Tools and techniques for network forensics, "International Journal of Network Security & Its Applications.
  • Rajani Misra, Dr. Renu Dhir "Design of Network Forensic System Based on honey net" International Journal of Innovations in Engineering and Technology (IJIET).
  • Rajani Misra, Dr. Renu Dhir Cyber Crime Investigation and Network Forensic System Using Honey pot.
  • Spitzner, Lance. "Honey pots: Definitions and Value of Honey pots", May 2003, accessed: November 2012
  • Anonymous, "Honey pot (Computing)", Date Access :October 2012
  • Almutairi, Abdul razzak "Survey of High Interaction Honey-pot Tools: Merits and Shortcomings", June 2012 Honeyd, "Honey pot Background", Date Accessed: October 2012
  • The Honey net Project "Scan of the Month13" March, 2001.
  • The Honey net Project "Know Your Enemy: Honey nets", January, 2003