A novel honeypot based security approach for real-time intrusion detection and prevention systems

被引:56
作者
Baykara, Muhammet [1 ]
Das, Resul [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Software Engn, TR-23119 Elazig, Turkey
关键词
Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization; FRAMEWORK; NETWORKS; ATTACKS; MODEL;
D O I
10.1016/j.jisa.2018.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/ prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 44 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]   Scalable and Performance-Efficient Client Honeypot on High Interaction System [J].
Akiyama, Mitsuaki ;
Kawakoya, Yuhei ;
Hariu, Takeo .
2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, :40-50
[3]  
[Anonymous], RECENT ADV COMPUTER
[4]  
[Anonymous], 2012 SPRING C ENG TE
[5]  
B. I. Australia, INFOGRAPHIC EVERYTHI
[6]  
Baykara M, 2015, INT J COMPUT NETW AP, V2, P9
[7]  
Beham M., 2013, Proceedings of the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks DSN, P1
[8]   Network layer attacks and countermeasures in cognitive radio networks: A survey [J].
Bouabdellah, Mounia ;
Kaabouch, Naima ;
El Bouanani, Faissal ;
Ben-Azza, Hussain .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :40-49
[9]  
Campbell S, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P238
[10]   Automatic network intrusion detection: Current techniques and open issues [J].
Catania, Carlos A. ;
Garcia Garino, Carlos .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) :1062-1072