Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention

被引:0
作者
Movva, Sai Chaithanya [1 ]
Nikudiya, Suresh [1 ]
Basanaik, Varsha S. [1 ]
Edla, Damodar Reddy [1 ]
Bhukya, Hanumanthu [2 ]
机构
[1] Natl Inst Technol Goa, Ponda 403401, Goa, India
[2] Kakatiya Inst Technol & Sci, Warangal 506015, Telangana, India
关键词
Honeypot; IDS; IPS; Intruder; Malware; Venus Flytrap; Carnivorous plants;
D O I
10.1007/s11277-022-09988-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intrusion Detection Systems and Intrusion Prevention Systems are used to detect and prevent attacks/malware from entering the network/system. Honeypot is a type of Intrusion Detection System which is used to find the intruder, study the intruder and prevent the intruder to access the original system. It is necessary to build a strong honeypot because if it is compromised, the original system can be easily targeted by the attacker. To overcome such challenges an efficient honeypot is needed that can shut the attacker after extracting his attack technique and tools. In this paper, a Venus fly-trap optimization algorithm has been used for implementing the honeypot system along with Intrusion Detection System. Venus plants are a type of carnivorous plants that catch their prey intelligently. By adopting this feature we make an effective honeypot system that will intelligently interact with the attacker. A new fitness function has been proposed to identify size of the attacker. The effectiveness of the proposed fitness function has been evaluated by comparing it with state of the art. For comparison, remote-to-local attacks, probing attacks and DOS attacks are performed on both proposed and existing models. The proposed model is significant to catch/block all the intruders which were caught by the art and also the proposed model reduces the time of interaction between the attacker and honeypot system thereby giving minimum information to the attacker.
引用
收藏
页码:1041 / 1063
页数:23
相关论文
共 22 条
  • [1] [Anonymous], 2012, INT J COMPUTER APPL
  • [2] Elhardt N., 2006, WIKIPEDIA FREE E
  • [3] Venus Flytrap Optimization
    Gowri, R.
    Rathipriya, R.
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 519 - 531
  • [4] Biclustering Using Venus Flytrap Optimization Algorithm
    Gowri, R.
    Sivabalan, S.
    Rathipriya, R.
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, CIDM 2015, 2016, 410 : 199 - 207
  • [5] Goyal P., 2010, INT J COMPUTER APPL, V9, P11, DOI DOI 10.5120/1439-1947
  • [6] A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
    Hajisalem, Vajiheh
    Babaie, Shahram
    [J]. COMPUTER NETWORKS, 2018, 136 : 37 - 50
  • [7] Hayati Pedram, 2009, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), P290, DOI 10.1109/DEST.2009.5276764
  • [8] Ingham KennethStephanie Forrest., 2002, HIST SURVEY NETWORK
  • [9] Khosravifar Babak, 2008, 2008 22nd International Conference on Advanced Information Networking and Applications - Workshops, P997, DOI 10.1109/AINA.2008.44
  • [10] Kulkarni S, 2012, INT CONF INTERNET, P743