The main intention of this paper is to elaborately discuss about seriousness of Malware problem and project the importance. of online malware analysis in Malware defense research. Reaching the security of network systems is one of the most essential and popular technology in the area of information technology. One of the methods applied for network security is the use of honeypots. Network safety includes recording and analysis of network activities and captures, to find out the proof about the source of the attacks to the device safety. This is the simplest of all deployment technologies. As its name suggests, honeypots are on a network that is waiting for attackers to attack. That is, while the attacker provides what he wants and keeps track of it while keeping it busy Honeypots are not always production-worthy, but they help ensure that managers have time to act.Examples of honeypots that can be deployed using the Sacrificial lamb strategy include Deception tool kit (DTK) and Specter.
Deception Ports on Production Systems This deployment strategy mimics the various services on different ports of the system. For example, HTTP imitates on port 80 and SMTP imitates on port 25. The idea here is very similar to the idea of scapegoat technology. That is, an attacker can fool an attacker in such a way that they can take actions such as tracers, tricks, and so on while they are trying to crack the trick. This kind of deployment is the most common and least responsive. Examples of honeypots that can be deployed using this strategy include Honeyd and Specter.
The system envisioned is an automatic collision detection and warning system relying on GPS module and a GSM modem. The vehicle to be safeguarded is to be fitted with the system sturdily ensuring good mechanical coupling with the entire chassis. In the case of an accident the system detects it using the fact that the vehicle would be suddenly decelerated in such a condition. An accelerometer continuously monitors the acceleration of the vehicle and will detect decelerations greater than threshold value and send the data to the microcontroller via an ADC. The controller compares this with the threshold set value and immediately sends an SOS message to preset numbers. With this message the controller also transmits the GPS coordinates of the vehicle which it continuously obtains from the GPS module. This system will highly aid the search and rescue of vehicles that have met with an accident.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.