A Modular Approach for Implementation of Honeypots in Cyber Security
Muneeb Mirza; Muhammad Usman; Robert P. Biuk-Aghai; Simon Fong
2016
Source PublicationInternational Journal of Applied Engineering Research
ISSN0973-4562
Volume11Issue:8Pages:5446-5451
Abstract

This paper introduces a novel modular approach of implementing honeypots in cyber security. There are many other security technologies like firewalls, IDS, anti-malware and antivirus software that are part of a cyber security infrastructure. Honeypot technology is a relatively new and emerging area of research to cope with new security threats and challenges. Denial of service attacks, distributed denial of service attack, malware and zero day attacks are still a major threat to the Internet. Many proposals and models have been presented in the past but none is successful by itself. In this paper we are presenting a conceptual modular approach to help solve these issues. Each module is independent in implementation resulting in better performance and better security. In future we will implement this model and make it more efficient based on real time results and analysis.

KeywordAntimalware Antivirus Cyber Security Honeypots Intrusion Detection System Network Security Signature
URLView the original
Language英语
Fulltext Access
Document TypeJournal article
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
AffiliationUniversidade de Macau
Recommended Citation
GB/T 7714
Muneeb Mirza,Muhammad Usman,Robert P. Biuk-Aghai,et al. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research,2016,11(8):5446-5451.
APA Muneeb Mirza,Muhammad Usman,Robert P. Biuk-Aghai,&Simon Fong.(2016).A Modular Approach for Implementation of Honeypots in Cyber Security.International Journal of Applied Engineering Research,11(8),5446-5451.
MLA Muneeb Mirza,et al."A Modular Approach for Implementation of Honeypots in Cyber Security".International Journal of Applied Engineering Research 11.8(2016):5446-5451.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Muneeb Mirza]'s Articles
[Muhammad Usman]'s Articles
[Robert P. Biuk-Aghai]'s Articles
Baidu academic
Similar articles in Baidu academic
[Muneeb Mirza]'s Articles
[Muhammad Usman]'s Articles
[Robert P. Biuk-Aghai]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Muneeb Mirza]'s Articles
[Muhammad Usman]'s Articles
[Robert P. Biuk-Aghai]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.