Honeypot-Based Intrusion Detection System: A Performance Analysis

被引:0
|
作者
Kondra, Janardhan Reddy [1 ]
Bharti, Santosh Kumar [1 ]
Mishra, Sambit Kumar [1 ]
Babu, Korra Sathya [1 ]
机构
[1] Natl Inst Technol, Rourkela 769008, India
来源
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT | 2016年
关键词
Control center; Firewall; Honeypots; Honeypssot farm; Honeywall; Sebek; Snort; Virtual honeyd;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. "Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks". This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.
引用
收藏
页码:2347 / 2351
页数:5
相关论文
共 50 条
  • [1] Intrusion Detection System Based on Real Time Rule Accession and Honeypot
    Singh, Abhay Nath
    Kumar, Shiv
    Joshi, R. C.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 292 - 301
  • [2] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [3] Performance Analysis of Snort-based Intrusion Detection System
    Garg, Akash
    Maheshwari, Prachi
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [4] Early Intrusion Detection System using honeypot for industrial control networks
    Pashaei, Abbasgholi
    Akbari, Mohammad Esmaeil
    Lighvan, Mina Zolfy
    Charmin, Asghar
    RESULTS IN ENGINEERING, 2022, 16
  • [5] A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
    Artail, Hassan
    Safa, Haidar
    Sraj, Malek
    Kuwatly, Iyad
    Al-Masri, Zaid
    COMPUTERS & SECURITY, 2006, 25 (04) : 274 - 288
  • [6] Performance Evaluation of an Intrusion Detection System
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    El Farissi, Ilhame
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 509 - 517
  • [7] Deployment of Intrusion Detection System in Cloud: A Performance-based Study
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1103 - 1108
  • [8] A novel honeypot based security approach for real-time intrusion detection and prevention systems
    Baykara, Muhammet
    Das, Resul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 103 - 116
  • [9] Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 829 - 834
  • [10] Analysis of Modern Intrusion Detection System
    Titorenko, Aleksey A.
    Frolov, Alexey A.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 142 - 143