Double-Sticky-Honeynet for Defending Viruses in Computer Network
نویسندگان
چکیده
منابع مشابه
Defending Polymorphic Worms in Computer network using Honeynet
We propose a defense mechanism in computer network using gate-translator, double honeynet, sticky honeypot and antivirus engine of CloudAV, which attracts polymorphic worms. An algorithm is proposed to detect and remove the polymorphic worms and innocuous traffic related packets. Future antivirus is implemented on logically detached unused system.
متن کاملDefending Polymorphic Worms in Computer Network using Honeypot
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. KeywordsPolymorphic worm; Honeypot; Honeynet; Sticky h...
متن کاملResponse Mechanism for Defending Computer Networks
With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...
متن کاملDeveloping A Framework for Defending Network Attacks
As the Internet becomes more mature and a part of our daily life, technologies used to provide continuous services of the Internet under all circumstances become more crucial. Collectively, these technologies ensure that resources are always available and stable. Since network attack is very easy to deploy and has very low cost, it has become the main reason of network instability and is the mo...
متن کاملDefending a Computer System Using Autonomous Agents
This report presents a prototype architecture of a defense mechanism for computer systems. The intrusion detecl.ion problem is introduced and some of the key aspects of any solution are explained. Standard intrusion deteclion systems are built as a single monolithic module. A finer-grained approach is proposed, where small, independent agents monitor the system. TILcse agents are taught how to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Soft Computing
سال: 2012
ISSN: 1816-9503
DOI: 10.3923/ijscomp.2012.131.134