A Modular Approach for Implementation of Honeypots in Cyber Security | |
Muneeb Mirza; Muhammad Usman; Robert P. Biuk-Aghai; Simon Fong![]() | |
2016 | |
Source Publication | International Journal of Applied Engineering Research
![]() |
ISSN | 0973-4562 |
Volume | 11Issue:8Pages:5446-5451 |
Abstract | This paper introduces a novel modular approach of implementing honeypots in cyber security. There are many other security technologies like firewalls, IDS, anti-malware and antivirus software that are part of a cyber security infrastructure. Honeypot technology is a relatively new and emerging area of research to cope with new security threats and challenges. Denial of service attacks, distributed denial of service attack, malware and zero day attacks are still a major threat to the Internet. Many proposals and models have been presented in the past but none is successful by itself. In this paper we are presenting a conceptual modular approach to help solve these issues. Each module is independent in implementation resulting in better performance and better security. In future we will implement this model and make it more efficient based on real time results and analysis. |
Keyword | Antimalware Antivirus Cyber Security Honeypots Intrusion Detection System Network Security Signature |
URL | View the original |
Language | 英语 |
Fulltext Access | |
Document Type | Journal article |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Affiliation | Universidade de Macau |
Recommended Citation GB/T 7714 | Muneeb Mirza,Muhammad Usman,Robert P. Biuk-Aghai,et al. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research,2016,11(8):5446-5451. |
APA | Muneeb Mirza,Muhammad Usman,Robert P. Biuk-Aghai,&Simon Fong.(2016).A Modular Approach for Implementation of Honeypots in Cyber Security.International Journal of Applied Engineering Research,11(8),5446-5451. |
MLA | Muneeb Mirza,et al."A Modular Approach for Implementation of Honeypots in Cyber Security".International Journal of Applied Engineering Research 11.8(2016):5446-5451. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment