ABSTRACT
As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to unauthorized accesses and incursion of intrusions. In addition to maintaining low latency and poor performance for the client, filtering unauthorized accesses has become one of the major concerns of a server administrator.
Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. Activities on honeypots can be considiered suspicious by definition, as there is no point for benign users to interact with these systems. Honeypots come in many shapes and sizes; examples include dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users. Most honeypots are installed and configured inside the firewall programs so that they can be better controlled.
In this paper, we are proposing the concept of Forward and Backward Ants (Swarm Intelligence) along with Honeypots to detect the network intrusion by following a pre-established concept of load balancer and Intrusion Detection System.
- Ram Kumar Singh and Prof. T. Ramanujam, "Intrusion Detection System Using Advanced Honeypots," (IJCSIS) International Journal of Computer Science and Information Security, Vol. 2, No. 1, 2009Google Scholar
- Muhammad Adeel, Ahsan Ahmad Chaudhry, Ejaz Ahmed, Kashan Samad, Noor Mustafa Shaikh, "HONEYNETS: AN ARCHITECTURAL OVERVIEW"Google Scholar
- Information Assurance Tools Report: Intrusion Detection System, Sixth Edition September 25, 2009Google Scholar
- http://en.wikipedia.org/wiki/Intrusion_detection_systemGoogle Scholar
- http://www.honeypots.netGoogle Scholar
- http://www.securitydocs.com/library/2692Google Scholar
- www.armor2net.com/knowledge/intrusion_detection.htmGoogle Scholar
- Swarm Intelligence, Wikipedia, free EncyclopediaGoogle Scholar
- Intrusion detection system using honeypots and swarm intelligence
Recommendations
Design of network security projects using honeypots
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an ...
Honeypots: concepts, approaches, and challenges
ACM-SE 45: Proceedings of the 45th annual southeast regional conferenceInformation security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A ...
Honeypot in network security: a survey
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityIn this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we also defines the ...
Comments