A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks

被引:59
|
作者
Artail, Hassan
Safa, Haidar
Sraj, Malek
Kuwatly, Iyad
Al-Masri, Zaid
机构
[1] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 1107 2020, Lebanon
[2] Amer Univ Beirut, Dept Comp Sci, Beirut 1107 2020, Lebanon
关键词
intrusion detection; network security; computer security; organizational networks; honeypots; snort;
D O I
10.1016/j.cose.2006.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a hybrid and adaptable honeypot-based approach that improves the currently deployed IDSs for protecting networks from intruders. The main idea is to deploy low-interaction honeypots that act as emulators of services and operating systems and have them direct malicious traffic to high-interaction honeypots, where hackers engage with real services. The setup permits for recording and analyzing the intruder's activities and using the results to take administrative actions toward protecting the network. The paper describes the basic components, design, operation, implementation and deployment of the proposed approach, and presents several performance and load testing scenarios. Implementation and performance plus load testing show the adaptability of the proposed approach and its effectiveness in reducing the probability of attacks on production computers. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:274 / 288
页数:15
相关论文
共 50 条
  • [1] Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 829 - 834
  • [2] Early Intrusion Detection System using honeypot for industrial control networks
    Pashaei, Abbasgholi
    Akbari, Mohammad Esmaeil
    Lighvan, Mina Zolfy
    Charmin, Asghar
    RESULTS IN ENGINEERING, 2022, 16
  • [3] Hybrid Intrusion Detection Framework for Ad hoc networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghanemi, Salim
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (04) : 1 - 32
  • [4] Improving Intrusion Detection Systems for Wireless Sensor Networks
    Stetsko, Andriy
    Smolka, Tobias
    Matyas, Vashek
    Stehlik, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 343 - 360
  • [5] A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems
    Almalawi, Abdulmohsen
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 292 - 301
  • [6] A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning
    Akshay Kumaar, M.
    Samiayya, Duraimurugan
    Vincent, P. M. Durai Raj
    Srinivasan, Kathiravan
    Chang, Chuan-Yu
    Ganesh, Harish
    FRONTIERS IN PUBLIC HEALTH, 2022, 9
  • [7] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [8] A novel honeypot based security approach for real-time intrusion detection and prevention systems
    Baykara, Muhammet
    Das, Resul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 103 - 116
  • [9] USING NEURAL NETWORKS IN INTRUSION DETECTION SYSTEMS
    Merhaut, Filip
    Zelinka, Ivan
    MENDEL 2008, 2008, : 172 - 174
  • [10] Protecting Run-time Filters for Network Intrusion Detection Systems
    Valgenti, Victor C.
    Sun, Hai
    Kim, Min Sik
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 116 - 122