TCP attack analysis on packets captured using symantec decoy server
This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setu...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-29764 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-297642023-12-28T16:57:35Z TCP attack analysis on packets captured using symantec decoy server Nizamani A.B. Belaton B. 16022658200 6504014356 Denial of service attack Honeypots Symantec Decoy Server Computer crime Internet Network protocols Servers Denial of service attack Honeypots Intrusions Symantec Decoy Server Packet networks This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec Decoy Server based honeypot. These results highlight the importance of honeypot as a tool of learning and preventing future intrusions. � 2005 IEEE. Final 2023-12-28T08:57:35Z 2023-12-28T08:57:35Z 2005 Conference paper 10.1109/ICICT.2005.1598595 2-s2.0-33847314649 https://www.scopus.com/inward/record.uri?eid=2-s2.0-33847314649&doi=10.1109%2fICICT.2005.1598595&partnerID=40&md5=16f5d8d20329a04ddcd094d1245f5a9e https://irepository.uniten.edu.my/handle/123456789/29764 2005 1598595 249 254 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Denial of service attack Honeypots Symantec Decoy Server Computer crime Internet Network protocols Servers Denial of service attack Honeypots Intrusions Symantec Decoy Server Packet networks |
spellingShingle |
Denial of service attack Honeypots Symantec Decoy Server Computer crime Internet Network protocols Servers Denial of service attack Honeypots Intrusions Symantec Decoy Server Packet networks Nizamani A.B. Belaton B. TCP attack analysis on packets captured using symantec decoy server |
description |
This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec Decoy Server based honeypot. These results highlight the importance of honeypot as a tool of learning and preventing future intrusions. � 2005 IEEE. |
author2 |
16022658200 |
author_facet |
16022658200 Nizamani A.B. Belaton B. |
format |
Conference paper |
author |
Nizamani A.B. Belaton B. |
author_sort |
Nizamani A.B. |
title |
TCP attack analysis on packets captured using symantec decoy server |
title_short |
TCP attack analysis on packets captured using symantec decoy server |
title_full |
TCP attack analysis on packets captured using symantec decoy server |
title_fullStr |
TCP attack analysis on packets captured using symantec decoy server |
title_full_unstemmed |
TCP attack analysis on packets captured using symantec decoy server |
title_sort |
tcp attack analysis on packets captured using symantec decoy server |
publishDate |
2023 |
_version_ |
1806426470066683904 |
score |
13.212979 |