Double-Sticky-Honeynet for Defending Viruses in Computer Network

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Polymorphic Worms in Computer network using Honeynet

We propose a defense mechanism in computer network using gate-translator, double honeynet, sticky honeypot and antivirus engine of CloudAV, which attracts polymorphic worms. An algorithm is proposed to detect and remove the polymorphic worms and innocuous traffic related packets. Future antivirus is implemented on logically detached unused system.

متن کامل

Defending Polymorphic Worms in Computer Network using Honeypot

Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. KeywordsPolymorphic worm; Honeypot; Honeynet; Sticky h...

متن کامل

Response Mechanism for Defending Computer Networks

With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...

متن کامل

Developing A Framework for Defending Network Attacks

As the Internet becomes more mature and a part of our daily life, technologies used to provide continuous services of the Internet under all circumstances become more crucial. Collectively, these technologies ensure that resources are always available and stable. Since network attack is very easy to deploy and has very low cost, it has become the main reason of network instability and is the mo...

متن کامل

Defending a Computer System Using Autonomous Agents

This report presents a prototype architecture of a defense mechanism for computer systems. The intrusion detecl.ion problem is introduced and some of the key aspects of any solution are explained. Standard intrusion deteclion systems are built as a single monolithic module. A finer-grained approach is proposed, where small, independent agents monitor the system. TILcse agents are taught how to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Soft Computing

سال: 2012

ISSN: 1816-9503

DOI: 10.3923/ijscomp.2012.131.134