A novel honeypot based security approach for real-time intrusion detection and prevention systems

被引:54
作者
Baykara, Muhammet [1 ]
Das, Resul [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Software Engn, TR-23119 Elazig, Turkey
关键词
Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization; FRAMEWORK; NETWORKS; ATTACKS; MODEL;
D O I
10.1016/j.jisa.2018.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/ prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
  • [21] Novel intrusion prediction mechanism based on honeypot log similarity
    Jiang, Ci-Bin
    Liu, I-Hsien
    Chung, Yao-Nien
    Li, Jung-Shian
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2016, 26 (03) : 156 - 175
  • [22] A Novel Approach for Redirecting Module in Honeypot Systems
    YANG Geng~1
    2.Department of Electrical and Computer and Engineering
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2005, (03) : 58 - 62
  • [23] A Novel Approach of intrusion detection system design for computer network security
    Yi, Julan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3021 - 3025
  • [24] Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks
    Bocu, Razvan
    Iavich, Maksim
    SYMMETRY-BASEL, 2023, 15 (01):
  • [25] A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm
    Sobh, Tarek Salah
    JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (04) : 845 - 879
  • [26] Feature weighting and selection for a real-time network intrusion detection system based on GA with KNN
    Su, Ming-Yang
    Chang, Kai-Chi
    Wei, Hua-Fu
    Lin, Chun-Yuen
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 195 - 204
  • [27] Real-time Intrusion Detection System based on Self-Organized Maps and Feature Correlations
    Oh, Hayoung
    Chae, Kijoon
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1154 - +
  • [28] A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
    Gupta, Brij B.
    Yadav, Krishna
    Razzak, Imran
    Psannis, Konstantinos
    Castiglione, Arcangelo
    Chang, Xiaojun
    COMPUTER COMMUNICATIONS, 2021, 175 : 47 - 57
  • [29] Real-Time Power System Event Detection: A Novel Instance Selection Approach
    Intriago, Gabriel
    Zhang, Yu
    IEEE ACCESS, 2023, 11 : 46765 - 46781
  • [30] A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning
    Rustam, Furqan
    Raza, Ali
    Qasim, Muhammad
    Posa, Sarath Kumar
    Jurcut, Anca Delia
    IEEE ACCESS, 2024, 12 : 39614 - 39627