CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot

Published on April 2017 by Juhi Khan, Rajesh Kumar Chakrawarti
National Conference on Contemporary Computing
Foundation of Computer Science USA
NCCC2016 - Number 1
April 2017
Authors: Juhi Khan, Rajesh Kumar Chakrawarti
b419f800-8eba-430c-aa95-32e305eebf9a

Juhi Khan, Rajesh Kumar Chakrawarti . Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot. National Conference on Contemporary Computing. NCCC2016, 1 (April 2017), 15-18.

@article{
author = { Juhi Khan, Rajesh Kumar Chakrawarti },
title = { Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot },
journal = { National Conference on Contemporary Computing },
issue_date = { April 2017 },
volume = { NCCC2016 },
number = { 1 },
month = { April },
year = { 2017 },
issn = 0975-8887,
pages = { 15-18 },
numpages = 4,
url = { /proceedings/nccc2016/number1/27335-6310/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Contemporary Computing
%A Juhi Khan
%A Rajesh Kumar Chakrawarti
%T Review of Detection of Intruders and Recovery of Information through Network Forensic using Honeypot
%J National Conference on Contemporary Computing
%@ 0975-8887
%V NCCC2016
%N 1
%P 15-18
%D 2017
%I International Journal of Computer Applications
Abstract

Network forensic is a technique for diagnose, association, examine, separating and collection of digital proof from multiple sources for the purpose of accumulate the reason of attacks and try to recover the data and information and tracking of criminals. Network forensic is a grimy process that involves the collection of different evidence through various sources. In Today's world, the large volume of data and major information are transported and relocate from one place to another's electronically through networks. In networks, there were many malicious activities and attackers are performed. It plays a vital role in process of battle against cyber crime and uncertified hacking process. So, In this paper Author adopts some procedure, tools and mechanism to expose or analyzing network intruders and retrieval of information through various implementations and they are mainly focusing in honey-pot which is created with the help of honey-d for gathering data about internal and external invader in which result was collected over the 4 weeks period and server side code which is treated as real server for collecting information about intruders. At the same time organize safety is compact, and the current attempt to implant well-being is for the most part taking into account the known truths of the aloof assurance model. IDs is a originate system security in view of active protection changes

References
  1. A. Almulhem, "Network forensics: Notions and challenges" Dec 14-17, 2014.
  2. D. Akkaya and F. Thalgott, Honey-pots in Network Security, Linnaeus University, Sweden, 2015.
  3. F. Raynal, D. Kaminsky, P. Biondi, and Y. Berthier, "Honey pot forensics, Part I: Analyzing the network, "IEEE Security & Privacy
  4. F. Raynal, D. Kaminsky, P. Biondi,and Y. Berthier, "Honey pot forensics, Part II: Analyzing the network, "IEEE Security
  5. S. David off and J. Ham. Network Forensics Tracking Hackers through Cyberspace, USA: Pearson 2012.
  6. K. Scarfone and P. Mell. "Guide to intrusion detection and prevention systems (IDPS)," NIST Special Publication, 2007
  7. N. Provosand and T. Holz, Virtual Honey pots: From boot net Tracking to Intrusion Detection, 1st ed. Boston, and USA: Addison Wesley Professional, 2007.
  8. T. Grudziecki et al. , "Proactive detection of security and incidents," Document Report, ENISA, 2012. A. Nyre, "Increasing survivability by dynamic.
  9. Deployment of honey pots," M. S. thesis, Dept. of Telematics, Univ. of Science and Technology, Norwegian, 2005.
  10. H. Artail, H. Safab, M. Sraj, I. Kuwatly, Z. AlMasri, Intrusion detection systems in protecting organizational networks," Network Security.
  11. N. Meghanathan, S. Allam, and L. Moore, "Tools and techniques for network forensics, "International Journal of Network Security & Its Applications.
  12. Rajani Misra, Dr. Renu Dhir "Design of Network Forensic System Based on honey net" International Journal of Innovations in Engineering and Technology (IJIET).
  13. Rajani Misra, Dr. Renu Dhir Cyber Crime Investigation and Network Forensic System Using Honey pot.
  14. Spitzner, Lance. "Honey pots: Definitions and Value of Honey pots", May 2003, accessed: November 2012
  15. Anonymous, "Honey pot (Computing)", Date Access :October 2012
  16. Almutairi, Abdul razzak "Survey of High Interaction Honey-pot Tools: Merits and Shortcomings", June 2012 Honeyd, "Honey pot Background", Date Accessed: October 2012
  17. The Honey net Project "Scan of the Month13" March, 2001.
  18. The Honey net Project "Know Your Enemy: Honey nets", January, 2003
Index Terms

Computer Science
Information Sciences

Keywords

Honey-pot Honey-net Network Forensics Intrusion Detection Malware Intruders Hackers Cybercrime