skip to main content
10.1145/2007052.2007060acmconferencesArticle/Chapter ViewAbstractPublication PagesacaiConference Proceedingsconference-collections
research-article

Intrusion detection system using honeypots and swarm intelligence

Published:21 July 2011Publication History

ABSTRACT

As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator.

Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled.

In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.

References

  1. Ram Kumar Singh and Prof. T. Ramanujam, "Intrusion Detection System Using Advanced Honeypots," (IJCSIS) International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009Google ScholarGoogle Scholar
  2. Muhammad Adeel, Ahsan Ahmad Chaudhry, Ejaz Ahmed, Kashan Samad, Noor Mustafa Shaikh, "HONEYNETS: AN ARCHITECTURAL OVERVIEW"Google ScholarGoogle Scholar
  3. Information Assurance Tools Report: Intrusion Detection System, Sixth Edition September 25, 2009Google ScholarGoogle Scholar
  4. http://en.wikipedia.org/wiki/Intrusion_detection_systemGoogle ScholarGoogle Scholar
  5. http://www.honeypots.netGoogle ScholarGoogle Scholar
  6. http://www.securitydocs.com/library/2692Google ScholarGoogle Scholar
  7. www.armor2net.com/knowledge/intrusion_detection.htmGoogle ScholarGoogle Scholar
  8. Swarm Intelligence, Wikipedia, free EncyclopediaGoogle ScholarGoogle Scholar
  1. Intrusion detection system using honeypots and swarm intelligence

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
        July 2011
        248 pages
        ISBN:9781450306355
        DOI:10.1145/2007052

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 July 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate173of395submissions,44%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader