A novel honeypot based security approach for real-time intrusion detection and prevention systems

被引:54
|
作者
Baykara, Muhammet [1 ]
Das, Resul [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Software Engn, TR-23119 Elazig, Turkey
关键词
Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization; FRAMEWORK; NETWORKS; ATTACKS; MODEL;
D O I
10.1016/j.jisa.2018.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/ prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
  • [1] A hybrid approach for real-time network intrusion detection systems
    Lee, Sang Min
    Kim, Dong Seong
    Park, Jong Sou
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 712 - 715
  • [2] Intrusion Detection and Prevention using Honeypot Network for Cloud Security
    Negi, Poorvika Singh
    Garg, Aditya
    Lal, Roshan
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 129 - 132
  • [3] Intrusion Detection System Based on Real Time Rule Accession and Honeypot
    Singh, Abhay Nath
    Kumar, Shiv
    Joshi, R. C.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 292 - 301
  • [4] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou A.L.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062
  • [5] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +
  • [6] A real-time intrusion detection algorithm for network security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    2008, WSEAS (07):
  • [7] Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
    Hofstede, Rick
    Pras, Aiko
    DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 109 - 112
  • [8] Real-time Security Solution for Automatic Detection and Tracking of Intrusion
    Bar, Debesh
    Pande, Dhruv
    Sandhu, Manveer Singh
    Upadhyaya, Vikas
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 399 - 402
  • [9] RBF-based real-time hierarchical intrusion detection systems
    Jiang, J
    Zhang, CL
    Kamel, M
    PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS 2003, VOLS 1-4, 2003, : 1512 - 1516
  • [10] Adaptive Security Model in Real-time Intrusion Detection Environment
    Han, Myung-Mook
    Li, Dong-Hui
    Jeong, Taikyeong Ted
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (04): : 1373 - 1383