A novel honeypot based security approach for real-time intrusion detection and prevention systems

被引:56
作者
Baykara, Muhammet [1 ]
Das, Resul [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Software Engn, TR-23119 Elazig, Turkey
关键词
Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization; FRAMEWORK; NETWORKS; ATTACKS; MODEL;
D O I
10.1016/j.jisa.2018.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/ prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
[1]   REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM [J].
Zhou A.L. .
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12) :1055-1062
[2]   Real-time Application of Intrusion Detection Algorithm Based on Machine Learning in Security System [J].
Zhao, Xueqi .
2024 INTERNATIONAL CONFERENCE ON POWER, ELECTRICAL ENGINEERING, ELECTRONICS AND CONTROL, PEEEC, 2024, :752-757
[3]   A Novel Research on Real-Time Intrusion Detection Technology Based on Data Mining [J].
Yi, Julan .
PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 :881-885
[4]   A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud [J].
Sharma, Sparsh ;
Kaul, Ajay .
VEHICULAR COMMUNICATIONS, 2018, 12 :138-164
[5]   A real-time Network Intrusion Detection System based on incremental mining approach [J].
Su, Ming-Yang ;
Chang, Kai-Chi ;
Wei, Hua-Fu ;
Lin, Chun-Yuen .
ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, :179-+
[6]   A security policy and Network Cartography based Intrusion Detection and Prevention Systems [J].
Meharouech, Sourour ;
Bouhoula, Adel ;
Abbes, Tarek .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04) :279-291
[7]   Intrusion prevention system based on diskless Honeypot [J].
Yeh, Her-Tyan ;
Tsai, Yun-Jang .
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (02) :289-295
[8]   SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism [J].
Jin, Dongzi ;
Lu, Yiqin ;
Qin, Jiancheng ;
Cheng, Zhe ;
Mao, Zhongshu .
COMPUTERS & SECURITY, 2020, 97
[9]   Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles [J].
Jedh, Mubark ;
Lee, Jian Kai ;
Ben Othmane, Lot i .
2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, :864-873
[10]   A real-time alert correlation method based on code-books for intrusion detection systems [J].
Mahdavi, Ehsan ;
Fanian, Ali ;
Amini, Fatima .
COMPUTERS & SECURITY, 2020, 89