2012 Spring Congress on Engineering and Technology 2012
DOI: 10.1109/scet.2012.6342030
|View full text |Cite
|
Sign up to set email alerts
|

Effective of Unicast and Multicast IP Address Attack over Intrusion Detection System with Honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Honeypots are not used for solving any network security problem on their own; they are rather used as a part of the system security, which means that honeypots are designed and positioned according to the problems they are to solve. An extensive literature review reveals that there are many security applications where intrusion detection and prevention systems (IDPS) are used in conjunction with honeypot systems [10][11][12][13][14][15][16][17].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Honeypots are not used for solving any network security problem on their own; they are rather used as a part of the system security, which means that honeypots are designed and positioned according to the problems they are to solve. An extensive literature review reveals that there are many security applications where intrusion detection and prevention systems (IDPS) are used in conjunction with honeypot systems [10][11][12][13][14][15][16][17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the work of Pomsathit, IDSs were used with honeypot systems on distributed networks. In this study, the efficiency of these systems was measured by analyzing a system first with IDS, then reanalyzing the same system with a honeypot IDS [17]. In their work, Jiang and Liu emphasized the importance of implementing honeypot systems in systems that enterprise business networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, Mccarty et al [11] were among the first to conduct analysis on integrating HP and honeynet methodologies. Pomsathit [12] proposed an HP system for ensuring security in communication in distributed networks. Li and Liu [13] proposed a model for automatically constructing signatures by using honeypots utilizing the data captured in them.…”
Section: Introductionmentioning
confidence: 99%