Premium Essay

Nt1330 Unit 4.1 Operating System

Submitted By
Words 803
Pages 4
4.1 EXISTING SYSTEM Anonymous networks were operated by small and friendly communities of developers. As interest in anonymous P2P increased and the user base grew, malicious users inevitably appeared and tried different attacks. This is similar to the Internet, where widespread use has been followed by waves of spam and distributed denial-of-service attacks. Such attacks may require different solutions in anonymous networks. For example, blacklisting of originator network addresses does not work because anonymous networks conceal this information. These networks are more vulnerable to DoS attacks as well due to the smaller bandwidth . The benefit in using the NM was a User could use the resources with the aid of a valid ticket from NM.

FIGURE 4.1. Honeypot System Architecture

FIGURE 4.2. Architecture using honeypot as IDS

Existing architecture using honeypot as IDS to protect a network. The users or attacker will access the network either Internet or direct. Within a LAN, IDS with honeypot and a centralized server with database layers as described above are being connected. Once the user will access the network, all its interactions low or high will be monitored by the IDS and make a log file for that user. IDS will decide to make a user as blacklisted or not, also server’s …show more content…
This helps in survey in what kind of data the misbehavior user is interested on server or what kind of attack the misbehavior user is trying to in order to damage the data. The honeypot contains all the duplicate files present in the file server but the contents of these duplicate files present on honeypot will have junk data. The architecture proposed to trap the misbehaving user is as depicted in Fig. 3. The architecture has certain assumptions that are listed as

Similar Documents

Premium Essay

Test

...Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies...

Words: 2305 - Pages: 10