Intrusion Detection and the Use of Deception Systems
MetadataShow full metadata
There has been great amount of work done in the field of network intrusion detection over the past 20-30 years. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large number of systems but also to be able to react quickly to different events. This paper aims at studying and analyzing various aspects of network intrusion and intrusion detection. This paper also explains the relatively new concept of "honeypots". Honeypots are computers specifically designed to help learn the motives, skills and techniques of the hacker community. This paper describes in depth the concepts of honeypots and their contribution to the field of network security. The paper then proposes and designs an intrusion detection tool based on some of the existing intrusion detection techniques and the concept of honeypots.