Honeypot-Based Intrusion Detection System: A Performance Analysis

被引:0
|
作者
Kondra, Janardhan Reddy [1 ]
Bharti, Santosh Kumar [1 ]
Mishra, Sambit Kumar [1 ]
Babu, Korra Sathya [1 ]
机构
[1] Natl Inst Technol, Rourkela 769008, India
关键词
Control center; Firewall; Honeypots; Honeypssot farm; Honeywall; Sebek; Snort; Virtual honeyd;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. "Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks". This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.
引用
收藏
页码:2347 / 2351
页数:5
相关论文
共 50 条
  • [21] A dynamic honeypot design for intrusion detection
    Kuwatly, I
    Sraj, M
    Al Masri, Z
    Artail, H
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 95 - 104
  • [22] An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
    Arifianto, Ridho Maulana
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 409 - 415
  • [23] An Intrusion Detection System Model Based on Immune Principle and Performance Analysis
    CHEN Zhi-xian~1
    2.State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2005, (01) : 31 - 35
  • [24] Early Intrusion Detection System using honeypot for industrial control networks
    Pashaei, Abbasgholi
    Akbari, Mohammad Esmaeil
    Lighvan, Mina Zolfy
    Charmin, Asghar
    RESULTS IN ENGINEERING, 2022, 16
  • [25] Honeypot based Cellular Cross-layer Intrusion Detection and Response
    Islam, Md. Motaharul
    Alzahrani, Ali
    Kabir, Mohammad Raihan
    Rahman, Rifat
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (06): : 104 - 111
  • [26] A Study of Intrusion Signature based on Honeypot
    Tian, JF
    Wang, JL
    Li, RL
    Yang, XH
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 125 - 129
  • [27] Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory
    Anwar, Ahmed H.
    Zhu, Mu
    Wan, Zeilin
    Cho, Jin-Hee
    Kamhoua, Charles A.
    Singh, Munindar P.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3393 - 3398
  • [28] Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN
    Kumar, Gulshan
    Saha, Rahul
    Singh, Mandeep
    Rai, Mritunjay Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 53 - 62
  • [29] MDH and TWIN: Two original honeypot-based approaches to protect swarms of drones
    Chaumette, Serge
    Cubilier, Titien
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 783 - 787
  • [30] A performance-based grid intrusion detection system
    Leu, FY
    Lin, JC
    Li, MC
    Yang, CT
    PROCEEDINGS OF THE 29TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, 2005, : 525 - 530