Honeypot-based intrusion detection system: A performance analysis

Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. “Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks”. This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.

[1]  Binxing Fang,et al.  An architecture for intrusion detection using honey pot , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).

[2]  Yun Yang,et al.  Design of distributed honeypot system based on intrusion tracking , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[3]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[4]  Xiao Su,et al.  J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  Yi-Lang Tsai,et al.  Design of virtual honeynet collaboration system in existing security research networks , 2010, 2010 10th International Symposium on Communications and Information Technologies.

[6]  Álvaro Herrero,et al.  A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..

[7]  T. Holz,et al.  Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[8]  Zhenyu Zhang,et al.  The research and design of honeypot system applied in the LAN security , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[9]  Hassan Artail,et al.  A dynamic honeypot design for intrusion detection , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..

[10]  Zhang Li-juan Honeypot-based defense system research and design , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[11]  LiXiaoyong,et al.  An automatic scheme to construct Snort rules from honeypots data , 2005 .

[12]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[13]  Guofei Gu,et al.  HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.