Author:Veerasamy, Namosha; Mokhonoana, PM; Vorster, JDate:Jul 2006This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it ...Read more
Author:Veerasamy, Namosha; Eloff, JPDate:Sep 2007Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ ...Read more
Author:Velupillai, HM; Van Heerden, Renier P; Vorster, JDate:Sep 2007Wireless networks face innovative intrusion methods that have never been focused on wired networks. This paper describes a simple inexpensive way to implement a wireless intrusion detection system. The system takes advantage of the unique ...Read more