Security

Detecting Exploited Systems Using Honeynets in Large Enterprise Networks

Free registration required

Executive Summary

Computer Networks connected to Internet can be compromised and exploited by Hackers, Crackers or Virus Programmers. Even tough many networks are properly secured via various security mechanisms when connected to Internet. Large Corporate Networks or Government Networks are major targets of the hackers who break-in in the Networks. Various Corporate networks consist of thousands of computers equipped with various operating systems and networks are equipped with wide storage capacities and high speed connection to the Internet. As the high bandwidth usage on these networks, it becomes very difficult to identify malicious traffic coming from outside world. In this paper, A concept of Honey-net is proposed to assist Systems/Network Administrators to identify malicious traffic in the enterprise network.

  • Format: PDF
  • Size: 158.5 KB