Honeypot-Based Intrusion Detection System: A Performance Analysis

被引:0
|
作者
Kondra, Janardhan Reddy [1 ]
Bharti, Santosh Kumar [1 ]
Mishra, Sambit Kumar [1 ]
Babu, Korra Sathya [1 ]
机构
[1] Natl Inst Technol, Rourkela 769008, India
关键词
Control center; Firewall; Honeypots; Honeypssot farm; Honeywall; Sebek; Snort; Virtual honeyd;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. "Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks". This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.
引用
收藏
页码:2347 / 2351
页数:5
相关论文
共 50 条
  • [1] The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network
    Agrawal N.
    Tapaswi S.
    International Journal of Wireless Information Networks, 2017, 24 (1) : 14 - 26
  • [2] A Honeypot-based Attack Detection Method for Networked Inverted Pendulum System
    Xu, Baoyue
    Du, Dajun
    Zhang, Changda
    Zhang, Jin
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8645 - 8650
  • [3] Honeypot-based Defense System Research and Design
    Zhang Li-juan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
  • [4] Honeypot-based degree statistics method for scans detection
    Ma, Li-Bo
    Duan, Hai-Xin
    Tran, Quang-Anh
    Li, Xing
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2743 - +
  • [5] Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion Detection System in Smart Grid Networks
    Albaseer, Abdullatif
    Abdallah, Mohamed
    2022 5TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA), 2022,
  • [6] Network intrusion detection system based on Honeypot technology
    Zheng, Jun-Jie
    Xiao, Jun-Mo
    Liu, Zhi-Hua
    Wang, Xiao-Lei
    Wang, Hong-Tao
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (02): : 257 - 259
  • [7] A Review on Honeypot-based Botnet Detection Models for Smart Factory
    Seungjin, Lee
    Abdullah, Azween
    Jhanjhi, N. Z.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 418 - 435
  • [8] Enhancing network intrusion detection system with honeypot
    Yeldi, S
    Gupta, S
    Ganacharya, T
    Doshi, S
    Bahirat, D
    Ingle, R
    Roychowdhary, A
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1521 - 1526
  • [9] Honeypot-based Signature Generation for Polymorphic Worms
    Paul, Sounak
    Mishra, Bimal Kumar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 101 - 114
  • [10] Intrusion Detection System Based on Real Time Rule Accession and Honeypot
    Singh, Abhay Nath
    Kumar, Shiv
    Joshi, R. C.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 292 - 301