A novel honeypot based security approach for real-time intrusion detection and prevention systems

被引:56
作者
Baykara, Muhammet [1 ]
Das, Resul [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Software Engn, TR-23119 Elazig, Turkey
关键词
Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization; FRAMEWORK; NETWORKS; ATTACKS; MODEL;
D O I
10.1016/j.jisa.2018.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/ prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
[41]   DIGNN-A: Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph [J].
Liu, Jizhao ;
Guo, Minghao .
CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01) :817-842
[42]   An Effective Ensemble Learning-Based Real-Time Intrusion Detection Scheme for an In-Vehicle Network [J].
Alalwany, Easa ;
Mahgoub, Imad .
ELECTRONICS, 2024, 13 (05)
[43]   LMP Step Pattern Detection based on Real-Time Data [J].
Yuan, Haoyu ;
Li, Fangxing ;
Wei, Yanli .
2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
[44]   A Novel Topography-Based Approach for Real-Time Flood Inundation Mapping [J].
Shi, Pengfei ;
Lyu, Kai ;
Li, Zhenya ;
Yang, Tao ;
Xu, Chong-Yu ;
Hao, Xiaobo ;
Xiao, Jiaqing .
WATER RESOURCES RESEARCH, 2025, 61 (02)
[45]   A Method for Detecting Intrusion on Networks in Real-time Based on IP Weight [J].
黄本雄 .
High Technology Letters, 2001, (02) :34-38
[46]   Real-time Intrusion Alert Correlation System based on Prerequisites and Consequence [J].
Lin Zhaowen ;
Li Shan ;
Ma Yan .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[47]   Real-Time Event Framework based on component model for distributed real-time systems [J].
Yoon, EY ;
Yoon, YI .
PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, :1942-1948
[48]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[49]   MLIDS: A Machine Learning Approach for Intrusion Detection for Real Time Network Dataset [J].
Rokade, Monika D. ;
Sharma, Yogesh Kumar .
2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, :533-536
[50]   Security verification of real-time cryptographic protocols using a rewriting approach [J].
Tanaka, T ;
Kaji, Y ;
Watanabe, H ;
Takata, T ;
Kasami, T .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (04) :355-363