IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN
View Sample PDF
Author(s): Gulshan Kumar (Lovely Professional University, Punjab, India), Rahul Saha (Lovely Professional University, Punjab, India), Mandeep Singh (Lovely Professional University, Punjab, India)and Mritunjay Kumar Rai (Lovely Professional University, Punjab, India)
Copyright: 2018
Volume: 12
Issue: 1
Pages: 10
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco)and Ahmed A. Abd El-Latif (Menoufia University, Egypt)
DOI: 10.4018/IJISP.2018010105

Purchase

View Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN on the publisher's website for pricing and purchasing information.

Abstract

Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruder's activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation filtered and monitor traffic for highlight the intrusion in the network. Further attack sequence has been created and have shown the effects of attack sequence on scenario which have both honey pot and snoop agent with different network performance parameters like throughput, network load, queuing delay, retransmission attempt and packet. The simulation scenario shows the impact of attack on the network performance.

Related Content

Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang. © 2024. 19 pages.
Zhiqiang Wu. © 2024. 15 pages.
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi. © 2024. 27 pages.
. © 2024.
. © 2024.
Zhen Gu, Guoyin Zhang. © 2023. 15 pages.
Mallanagouda Biradar, Basavaraj Mathapathi. © 2023. 18 pages.
Body Bottom