Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/367
Full metadata record
DC FieldValueLanguage
dc.contributor.supervisorSingh, Maninder-
dc.contributor.authorVershney, Abhishek-
dc.date.accessioned2007-06-19T11:30:28Z-
dc.date.available2007-06-19T11:30:28Z-
dc.date.issued2007-06-19T11:30:28Z-
dc.identifier.urihttp://hdl.handle.net/123456789/367-
dc.description.abstractInternet it is rapidly changing its presence from a medium for elites to one in common use in our everyday lives. A decade ago, the first age of the Internet was a bright light shining above everyday concerns. It was a technological marvel bringing a new enlightenment to transform the world, just as the printing press fostered the original enlightenment a half millennium ago in Renaissance times. With the development of the Internet, and with the increasing pervasiveness of communication between networked computers, we are in the middle of the most transforming technological event since the capture of fire. Even after having firewall, latest Intrusion Detection System, and antivirus system, our organizations’ networks are not safe. If one patched antivirus for one worm, next day new worm comes up. By the time anyone patch network for this new worm, network may be attacked. So now the time it is very difficult to save our network from new attacks. Proactive network security is the act of managing the different components of network security, e.g. firewall, VPNs, antivirus software etc, so that anyone get the most performance from them while at the same time augmenting system with a vulnerability management system. In this report main emphasis is given to services of Proactive Network Security, how to achieve proactive network security, tools and techniques that can be used to implement it. Honeypot plays an important role in implementing Proactive Security Approach. A honeypot is a closely monitored computing resource that intended to be probed, attacked, or compromised. The value of a honeypot is determined by the information that can be obtained from it. Monitoring the data that enters and leaves a honeypot lets us gather information that is not available to Network Intrusion Detection System. In the market there are a lot of tools available for analyzing the data logged by Honeypot. These tools include Snort, Ethereal and Honeysnap. Honeysnap is a modular, python application that can parse raw or gzipped packet captured files and performs a number of diagnostics on the data. Honeysnap comes in text flavor, means it performs all operation in text-based environment. Currently no Graphical User Interface is available for Honeysnap. Apart from investigating proactive security realm, our objective is to design and develop a tool JGSnap that will provide a Graphical User Interface to Honeysnap, which will provide an easy to use interface to Honeysnap. JGSnap is a Java-based data analyzer with a Web Graphical User Interface that provides the graphical analysis of data provided by Honeysnap. It can generate different reports for the data. One of its main characteristics is as it is being developed in Java; it can potentially run on any platform, it may be Windows, Linux or Solaris.en
dc.format.extent2573584 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoenen
dc.subjectNetwork Securityen
dc.subjectHoneysnapen
dc.subjectJGSnapen
dc.titleJGSnap: A Graphical Analyzer for Honeysnapen
dc.typeThesisen
Appears in Collections:Masters Theses@CSED

Files in This Item:
File Description SizeFormat 
ME Thesis Abhishek Vershney Library (8053102).pdf2.51 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.