Honeypot-Based Intrusion Detection System: A Performance Analysis

被引:0
|
作者
Kondra, Janardhan Reddy [1 ]
Bharti, Santosh Kumar [1 ]
Mishra, Sambit Kumar [1 ]
Babu, Korra Sathya [1 ]
机构
[1] Natl Inst Technol, Rourkela 769008, India
关键词
Control center; Firewall; Honeypots; Honeypssot farm; Honeywall; Sebek; Snort; Virtual honeyd;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. "Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks". This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.
引用
收藏
页码:2347 / 2351
页数:5
相关论文
共 50 条
  • [31] Performance Analysis of an Intrusion Detection System using Panjab University Intrusion Dataset
    Singh, Raman
    Kumar, Harish
    Singla, R. K.
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [32] Comparative performance analysis of classification algorithms for intrusion detection system
    Anbar, Mohammed
    Abdullah, Rosni
    Hasbullah, Iznan H.
    Chong, Yung-Wey
    Elejla, Omar E.
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [33] Intrusion detection system based on speckle pattern analysis
    Dhall, A
    Chhabra, JK
    Aulakh, NS
    EXPERIMENTAL TECHNIQUES, 2005, 29 (01) : 25 - 31
  • [34] Intrusion detection system based on speckle pattern analysis
    A. Dhall
    J. K. Chhabra
    N. S. Aulakh
    Experimental Techniques, 2005, 29 : 25 - 31
  • [35] PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
    Jadhav, Abhijit D.
    Pellakuri, Vidyullatha
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [36] Application and Performance Analysis of Data Preprocessing for Intrusion Detection System
    Jiang, Shuai
    Xu, Xiaolong
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 163 - 177
  • [37] Stochastic Model for Cognitive Radio Networks under Jamming Attacks and Honeypot-Based Prevention
    Bhunia, Suman
    Su, Xing
    Sengupta, Shamik
    Vazquez-Abad, Felisa
    DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2014, 2014, 8314 : 438 - 452
  • [38] Analysis of Data Dependency Based Intrusion Detection System
    Nugmanov, Yermek
    Panda, Brajendra
    Hu, Yi
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 111 - +
  • [39] Intrusion detection system based on high-performance networks
    Chen, Xiaosu
    Jiang, Chao
    Xiao, Daoju
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2002, 30 (03):
  • [40] Improving Performance of Mobile Agent Based Intrusion Detection System
    Shah, Bhavin
    Trivedi, Bhushan H.
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 425 - 430