Honeypot-Based Intrusion Detection System: A Performance Analysis

被引:0
作者
Kondra, Janardhan Reddy [1 ]
Bharti, Santosh Kumar [1 ]
Mishra, Sambit Kumar [1 ]
Babu, Korra Sathya [1 ]
机构
[1] Natl Inst Technol, Rourkela 769008, India
来源
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT | 2016年
关键词
Control center; Firewall; Honeypots; Honeypssot farm; Honeywall; Sebek; Snort; Virtual honeyd;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. "Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks". This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.
引用
收藏
页码:2347 / 2351
页数:5
相关论文
共 50 条
  • [41] Intrusion detection and prevention system for an IoT environment
    Kumar, Ajay
    Abhishek, K.
    Ghalib, M. R.
    Shankar, A.
    Cheng, X.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (04) : 540 - 551
  • [42] A mechanism of intrusion detection system cooperating with firewall
    Cao, Zijian
    Rong, Xiaofeng
    Cao, Z., 2013, Asian Network for Scientific Information (12) : 6449 - 6454
  • [43] Analysis of update delays in signature-based network intrusion detection systems
    Gascon, Hugo
    Orfila, Agustin
    Blasco, Jorge
    COMPUTERS & SECURITY, 2011, 30 (08) : 613 - 624
  • [44] Design of a worm isolation and unknown worm monitoring system based on Honeypot
    Nasser A, AlFraih AbdulAziz
    Chen, Wenbo
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 656 - 659
  • [45] An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System
    Laufenberg, Daniel
    Li, Lei
    Shahriar, Hossain
    Han, Meng
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 169 - 169
  • [46] Implementation and Performance Evaluation of Network Intrusion Detection Systems
    Saber, Mohammed
    Ghaouth Belkasmi, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 484 - 495
  • [47] Performance Evaluation of Intrusion Detection System Using Anomaly and Signature based algorithms to Reduction False Alarm Rate and Detect Unknown Attacks
    Hussein, Safwan Mawlood
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1064 - 1069
  • [48] An Improved Snort Intrusion Detection System Based on Self-similar Traffic Model
    Kong Hong
    Zhang Jiangang
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 939 - 942
  • [49] Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Rajarajan, Muttukrishnan
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 905 - 912
  • [50] Detection using Intrusion Detection System (IDS) and SMS Gateway Controller
    Arhami, Muhammad
    Arianda, Akhbar
    Fata, Akmalul
    Yassir
    Desiani, Anita
    Arifai, Muhammad
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2023, 70 (02) : 449 - 453