Network monitoring & analysis along with comparative study of honeypots

The network security needs a powerful tool which should be implemented for large growing network system. The honeypot is one of the possible solutions in this large network environment. It uses a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new phishing sites can be earlier detected and quickly pull out of the network system. Another popular use of honeypots is to collect useful information about phishers' activities, which is used to make various kinds of statistics for the purposes of research and forensics. Recently, it has also been proposed to actively feed phishers with honeytokens. [3] In the present paper, the description about some problems of existing anti-phishing tools, network monitoring tools Xprobe, honeyD, etc. are used to check all the IP addresses in the network system.

[1]  Shujun Li,et al.  A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.

[2]  Yuichi Nakamura,et al.  Efficient key management based on the subset difference method for secure group communication , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[3]  David Fernández,et al.  Versatile virtual honeynet management framework , 2017, IET Inf. Secur..

[4]  Jung Hee Cheon,et al.  White-box AES implementation revisited , 2016, Journal of Communications and Networks.

[5]  Martin Husák,et al.  PhiGARo: Automatic Phishing Detection and Incident Response Framework , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[6]  Debasish Jena,et al.  Honeypot in network security: a survey , 2011, ICCCS '11.

[7]  Anazida Zainal,et al.  Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..

[8]  Biswanath Mukherjee,et al.  A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..

[9]  Ejaz Ahmed,et al.  Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.

[10]  Dharma P. Agrawal,et al.  APCAPT: Asymmetric power control against packet tracer attacks for base station location anonymity , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[11]  Angelo Furfaro,et al.  Honeypot-Powered Malware Reverse Engineering , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).