Performance analysis of honeypots against flooding attack

V Mahajan, J Singh - 2022 6th International Conference on …, 2022 - ieeexplore.ieee.org
Internet security is of the utmost importance to both consumers and organizations due to the
massive risk of attack by malicious hackers. In order to increase internet security …

Evaluation Of The Efficiency Of Honeypots In Opposing Flooding Attack

N Singh, D Sharma, V Rawat - 2023 International Conference …, 2023 - ieeexplore.ieee.org
The significance of internet security cannot be overstated for both individuals and
organizations, given the increasing threat of malicious cyber-attacks. To enhance internet …

[PDF][PDF] Network based intrusion detection using honey pot deception

KV Kulhalli, SR Khot - International Journal on Recent and Innovation …, 2014 - academia.edu
The Main purpose of this paper is to design, implement and evaluate a strong Intrusion
Detection System (IDS) using Honey pot Deception, which is a Network based IDS (NBIDS) …

[图书][B] Parallelizing a Network Intrusion Detection System using a GPU

APM Sathik - 2012 - search.proquest.com
As network speeds continue to increase and attacks get increasingly more complicated,
there is need to improved detection algorithms and improved performance of Network …

[PDF][PDF] LAN Based Intrusion Detection And Alerts

V Malik, M Jhawar, AK Harleen, N Chawla - IJSTR, May, 2014 - Citeseer
With the ever increasing size and number of networks around the world, the network traffic
increases even more. The pace at which such an increase is observed, gives a rise to the …

Survival Time: A Survey on the Current Survival Time for an Unprotected Public System

M Rosenberg - 2013 - diva-portal.org
What is the temperature really in the Internet sea? Do we see a global warming with
accumulating worms and malware propagating our networks? The survival time on the …