2012
DOI: 10.5121/ijdps.2012.3304
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wmn Using Hybrid Honeypot System

Abstract: Wireless Mesh Network (WMN) has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect their attack techniques and b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
(3 reference statements)
0
2
0
Order By: Relevance
“…In case of the HoneyCloud [5] architecture and the hybrid system for wireless mesh networks [15], it is not clear whether an IP reconfiguration is applied. In case of the HoneyCloud architecture, the system description indicates that the public IP addresses are only configured on the HoneyCloud gateway, which is located between attackers and high-interaction honeypots.…”
Section: Ip Address Updatesmentioning
confidence: 99%
See 1 more Smart Citation
“…In case of the HoneyCloud [5] architecture and the hybrid system for wireless mesh networks [15], it is not clear whether an IP reconfiguration is applied. In case of the HoneyCloud architecture, the system description indicates that the public IP addresses are only configured on the HoneyCloud gateway, which is located between attackers and high-interaction honeypots.…”
Section: Ip Address Updatesmentioning
confidence: 99%
“…In contrast to the architecture by Bailey et al, only traffic that indicates malicious activity is forwarded to high-interaction honeypots. Similar to Honey@home, the hybrid honeypot architecture for wireless mesh networks applies low-interaction honeypots to process network scans and only malicious traffic is forwarded to high-interaction honeypots [15]. In contrast to the other architectures, Honeybrid provides a honeypot framework instead of a fully implemented architecture and leaves the handling of network scans to the actual implementation [4].…”
Section: Scan Handling Supportmentioning
confidence: 99%