3 Citations (Scopus)

Abstract

The need of securing computer networks in this digital era has remarkably raised. This is because advance in the information technology affects the risk of the networks. Moreover, highly confidential data are likely stored in a database server within the network. In order to mitigate possible security problems, we propose a mechanism which is able to detect a possible network attack. Next, honeypot is deployed according to this detecting result. It is by considering both internal and external factors, including the number of receiving packets, source machine being used for sending those packets, and dead processes. The experimental results which are taken by using a real environment show that the proposed method has been able to achieve better performance than existing algorithms.

Original languageEnglish
Pages (from-to)257-264
Number of pages8
JournalICIC Express Letters, Part B: Applications
Volume9
Issue number3
Publication statusPublished - 1 Mar 2018

Keywords

  • Computer attack
  • Data security
  • Honeypot
  • Information security
  • Network security

Fingerprint

Dive into the research topics of 'Detecting malicious activities in a computer cluster for developing dynamic honeypot'. Together they form a unique fingerprint.

Cite this