{"created":"2020-09-01T13:43:52.597065+00:00","id":3872,"links":{},"metadata":{"_buckets":{"deposit":"8a8750a3-f190-428d-a3c8-e89adbc4ceb9"},"_deposit":{"id":"3872","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3872"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3872","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Anti Network Scanning Honeypot System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In today computer security field, honeypot technology is rapidly maturing and various types of honeypots are establishing their role of countermeasure as viable and useful in modern network defense system. In this paper, we proposed the anti network scanning honeypot system that can deceive to potential hackers’ remote network scanning attempts. The proposed system dynamically creates virtual honeypot machines with configured virtual TCP/IP networking stack of different OS and these virtual honeypots can response different types of network scanning attempts correctly. The proposed system hides the real topology of internal networks design and displays the layout of virtual machines with configured virtual routing topology to remote hackers. The proposed system can detect different types of network scanning attempts and produce log for further analysis."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Network Security"},{"interim":"Intrusion detection"},{"interim":"Hacker Distraction"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-01"}],"displaytype":"preview","filename":"55050.pdf","filesize":[{"value":"345 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3872/files/55050.pdf"},"version_id":"20c94335-ebd3-4943-8be5-61676282c742"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Min, Aung Chan"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1596"},"item_title":"Anti Network Scanning Honeypot System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-01","publish_status":"0","recid":"3872","relation_version_is_last":true,"title":["Anti Network Scanning Honeypot System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:05:24.286733+00:00"}