Download now Free registration required
The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper, the authors proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from the network. To improve the detection performance of intrusion detection system, shadow honeypot is combined with it. This proposed system may improve the overall security of large scale networks by minimize the rate of false positives and detect better intrusion.
- Format: PDF
- Size: 442 KB