StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Application Controls, Monitoring, and Honeypots - Essay Example

Cite this document
Summary
There are a variety of both commercial and public domain intrusion detection systems, most of which use misuse detection. As Ilgun, Kemmer and Porras (1995) explain, they depends on a set of rules that define different types of known intrusion signatures…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Application Controls, Monitoring, and Honeypots
Read Text Preview

Extract of sample "Application Controls, Monitoring, and Honeypots"

Download file to see previous pages

In addition to maintaining the rules, someone must respond to the alerts. Sometimes signatures may also match valid activity, meaning that responding to alerts first requires determining whether the alert is the result of an intrusion or unexpected, but valid, system activity. All of these require highly trained personnel to carry out (Skoudis, 2002). The implication here is, and as our company's ICT director confirmed, that current intrusion detection systems are somewhat limited in capacity.

This does not mean that current intrusion systems are not effective but only they are not as effective as required. Within the context of the stated, it is commonly held that anomaly detection will ultimately prove more valuable and robust because it has the potential to identify previously unknown intrusions or attacks. It is, thus, that the corporation is currently investigating the implementation of honeypots. Honeypots are new security technologies that, while not a replacement for traditional intrusion detection systems, address some of the weaknesses of intrusion detection systems (Spitzner, 2003).

As their only purpose is to be attacked, all traffic to the honeypot can be considered an intrusion or an anomaly of some sort. For this reason there is no need to separate normal traffic from anomalous; this makes any data collected from a honeypot of high value. Added to that, since honeypots have no production value, no resource or person should be communicating with them, and therefore any activity arriving at a honeypot is likely to be a probe, scan, or attack. Their value comes from their potential ability to capture scans, probes, attacks, and other malicious activity (Spitzner, 2003).

There are three types of honeypots: low interaction, medium interaction, and high interaction. In order to collect information a honeypot must interact with the attacker, and the level of interaction refers to the degree of interaction the honeypot has with a potential attacker (Spitzner, 2003). A low interaction honeypot provides minimal service, like an open port. A medium interaction honeypot simulates basic interactions like asking for a login and password, but providing no actual service to log into.

High interaction honeypots offer a fully functioning service or operating system, which can potentially be compromised (Spitzner, 2003).Honeypots have also been shown to be effective against Internet worms. Laurent Oudot (2006) demonstrated how MSBlast could be detected and captured using Honeyd and some simple scripts. He also showed how worm propagation can be slowed using Honeyd to attract the worms attention and then respond very slowly to its requests. Using scripts, Oudot demonstrated how a honeypot could even launch a counter attack against a worm outbreak, either by isolating services or network segments, or by abusing the same vulnerability the worm used and then trying to kill the worm process.

Honeypots do face several important challenges: 1) honeypots are totally unaware of attacks not directed at them, 2) they must avoid being fingerprinted because if an attacker can easily identify honeypots their usefulness will be severely limited, and 3) like so many security technologies, they require configuring and maintaining by a knowledgeable person (Spitzner, 2003).Honeypots, because of their very nature, excel at detection. What makes them most attractive in the area of detection is the fact that they

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Application Controls, Monitoring, and Honeypots Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1502178-application-controls-monitoring-and-honeypots
(Application Controls, Monitoring, and Honeypots Essay)
https://studentshare.org/miscellaneous/1502178-application-controls-monitoring-and-honeypots.
“Application Controls, Monitoring, and Honeypots Essay”, n.d. https://studentshare.org/miscellaneous/1502178-application-controls-monitoring-and-honeypots.
  • Cited: 0 times

CHECK THESE SAMPLES OF Application Controls, Monitoring, and Honeypots

Undergraduate College Common Application for Transfering

I want to attend (new college) because I care about knowledge in-itself, and I realize this is my best opportunity to be around other students, with similar interests, purpose, and goals.... I have developed a considerable amount as a result of my time spent at (old college), and I… I believe in purpose, or at least something that transcends blind allegiance to the dollar, and this belief has taken me beyond my previous concerns scholastic concerns into new realms of academic investigation....
2 Pages (500 words) Admission/Application Essay

Price Controls The Minimum Wage

In most cases, the government formulates and implements price controls through the central bank.... Fixing the minimum wage that a worker is Price controls – The Minimum Wage Affiliation: Price control is an activity undertaken by the government through central authority charged with the duty and responsibility of overseeing the welfare of the economy.... In most cases, the government formulates and implements price controls through the central bank....
2 Pages (500 words) Admission/Application Essay

Application for A Place in Your College for a Business Major

The rationale for the present application essay is to apply for a place in college to pursue a Major in business studies.... REF: application for A Place in Your College for a Business Major I would like to apply for a place in your college/University to pursue a Major in business studies.... I would highly appreciate if you considered my application....
2 Pages (500 words) Admission/Application Essay

For Consideration of the Application

The applications essay "For Consideration of the application " states that the author would describe himself in a few lines here, to let the reader know some of the leadership abilities that he possesses, which are going to be helpful to me in my professional life.... hellip; I believe in ethical leadership....
1 Pages (250 words) Admission/Application Essay

Discuss the mechanism of replication

During the process of cell duplication the two identical strands of DNA replicate individually to form identical copies of DNA during the process of cell division.... The… The procedure onsets when both the old strands of the ds DNA unwind in the presence of enzyme DNA helicase.... Each of the strands serve as a template where DNA polymerase acts and incorporates the corresponding nucleotide....
1 Pages (250 words) Admission/Application Essay

Monitoring Our Home Planet

Some of the more common natural hazards that threaten the lives and livelihoods of human… Nevertheless, the internet has become a useful resource in the monitoring, assessing, forecasting, and responding to these natural This paper aims to explore the impact of three different natural phenomena that are responsible for natural disasters, and analyse how these phenomena are monitored via the internet....
4 Pages (1000 words) Admission/Application Essay

Controls in Business Activities of Clinkle Company

The author of this essay "controls in Business Activities of Clinkle Company" touches upon the controlling process in Clinkle Company.... This paper examines the importance of the ISO 9000 certification as used in most of business organisations that use it as a determinant of their controls in the management process, focusing on how it can be applied in the case of Clinkle, a startup company dealing in mobile payments.... eing a startup company that deals with various aspects of mobile payments, Clinkle needs to devise an effective strategy by which it can instate proper controls that can aid in its success....
5 Pages (1250 words) Admission/Application Essay

Statistical Process Control

Among their major functions and purposes, control charts aid in monitoring a given process for those significant causes of imminent variations, and helps in removing… For instance, you are late for work because of a flat tire.... However, they have core purposes regarding a process....
5 Pages (1250 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us