Detecting & Isolating Anonymous Nodes Using Honeypot In Networks

Authors(3) :-Sabari Giri Murugan S, Ganesan T, Thiyagu S

Detecting the anonymous nodes in network by using different approaches like honey pot to measure the security of the system and detect, deflect and counteract attempts at unauthorized use of information systems.However it provides a way to detect the malicious activities in network as well as by using honey pot we can easily detect and strengthen the systems by taking mitigation strategies. Furthermore using different tools to create an DOS and DDOS attack in network and analyzing its behavior and trying to detect and mitigate those kinds of attacks with canít disrupts the resources so that the genuine users are unable to access the service. Nowadays attacks are more in real life due to the loopholes which are found in software and hardware that human is using and the information is more reliable and invaluable things, by this project we can able to learn and mitigate those loop holes by using different technologies.

Authors and Affiliations

Sabari Giri Murugan S
CSE/IT, Jain University, Bangalore, Karnataka, India
Ganesan T
CSE, KL University, Vijayawada, Andhrapradesh, India
Thiyagu S
CSE/IT, Jain University, Bangalore, Karnataka, India

Distributed Denial of Service, Attack, Honey pot, Loop holes

  1. Christos Douligeris and AikateriniMitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art", Computer Networks: The Int. Journal of Computer and Telecommunications Networking, vol. 44, no. 5, Apr. 2004, pp. 643–666.
  2. Kumar Shridhar and Nikhil Gautam, "A Prevention of DDos Attacks in Cloud Using Honeypot ", International Journal of Science and Research, Volume 3 Issue 11, November 2014, pp. 2378-2383
  3. Aamir, M. and Arif, M., "Study and performance evaluation on recent DDoS trends of attack & defense", International Journal of Information Technology and Computer Science, 2013, pp. 54–65.
  4. Mokube Iyatiti and Adams Michele,-Honeypots: concepts, approaches, and challenges?, In the proceedings of the 45th annual southeast regional conference (ACM-SE), New York, USA, On Pages(s): 321 – 326, 2007
  5. Vinu V. Das, "Honeypot Scheme for Distributed Denial-of-Service", Proceedings of the 2009 International Conference on Advanced Computer Control, January 2009, pp. 497-501
  6. Yu Adachi and Yoshihiro Oyama, "Malware Analysis System using Process-Level Virtualization", Proceedings of IEEE Symposium on Computers and Communications, July 2009, pp. 550-556.
  7. S.T. Zargar, J. Joshi, and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, January 2013, pp. 2046–2069
  8. O. Kachirski and R. Guha, "Effective intrusion detection using multiple sensors in wireless ad hoc networks," in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on, pp. 8–pp, IEEE, 2003.
  9. Gupta Nirbhay,-Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach?, In the proceeding of Australian Information Warfare and Security Conference, Perth Western Australia 2002.
  10. Spitzner Lance, "Honeypots: Catching the Insider Threat", In the proceeding of 19th Annual Computer Security Applications Conference (ACSAC), On page(s): 170- 179, December 2003

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 926-931
Manuscript Number : CSEIT1833298
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Sabari Giri Murugan S, Ganesan T, Thiyagu S, "Detecting & Isolating Anonymous Nodes Using Honeypot In Networks ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.926-931, March-April-2018.
Journal URL :

Article Preview

Follow Us

Contact Us