3 research outputs found

    Network Security in Organizations using Intrusion Detection System based on Honeypots

    Get PDF
    The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost relevance and honeypots are promising tools for information and understanding of "areas of interest" of the attackers, and the possible relationship between blackhat teams. In this situation, people are increasingly trying to prevent their network security using traditional mechanisms, including firewalls, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a practitioner security, of course, they are tools that are intended to be attacked or interacted with other information about the attackers, their motives and tools. In this paper, we describe a comparative analysis of various IDS and their usefulness on various aspects. Two major categories of HoneyPot viz. low interaction honeypot and high-interaction honeypot have also been discussed in detail. In this paper, low-interaction honeypot is used as a traffic filter. Activities such as port scanning can be effectively detected by the weak interaction honeypot and stop there. Traffic that cannot be processed by the weak interaction honeypot is delivered over high-interaction honeypot. In this case, the weak interaction honeypot is used as a proxy for high-interaction honeypot then offer optimal realism

    Not Available

    No full text
    Not AvailableCastor being a perennial, cross-pollinated, sexually polymorphic crop with high environmental sensitivity, initial plant breeding efforts were restricted to plant height and duration. Domestication of a wild, perennial crop to an annual crop of medium plant height and duration is the first success. Further, development of a two-line breeding system and standard seed production technology led to successful commercial exploitation of heterosis. Being a monotypic genus, diversification of parental base is restricted to intra-generic, intraspecific, or inter-varietal hybridization. Phenotypic expression is highly plastic and varies with locations and seasons. Majority of the morphological characters are monogenic, independently assorted with very limited linkages among the traits. However, information on genetics of major morphological characters is scattered in several old publications. Conventional breeding methods were successful in developing about 40 high-yielding hybrids and varieties with inbuilt resistance to major pests and diseases. An effort is made in the present chapter to consolidate the information on genetics and breeding methods followed in India and elsewhere.Not Availabl
    corecore