Skip to main content
Erschienen in: Cluster Computing 6/2019

08.03.2018

Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model

verfasst von: A. Umamaheswari, B. Kalaavathi

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In current years, the use of mobile ad hoc networks (MANETs) has been extensive in many applications, counting some mission dangerous applications, and as such safety has become one of the foremost concerns in MANETs. Due to particular unique appearances of MANETs, prevention approaches alone are not satisfactory to make them protected; therefore, detection should be auxiliary as detection to attack that can break the system to hold packets. In general, the intrusion detection methods for traditional wireless networks are not well suited for MANETs. We propose a new Honey pot Deception trace back model, which is a honeypot TB-IDS. The system is positioned on the point of (server) network intrusion deceptions are nodes are carried out network weightage analyses model, from where it can monitors all the received traffic with continues weighing routes the data. It works as construct to reviews the transmission path and packet analyze to which the IP processed IDS for all the clients that are connected to the server. This TB-IDS detects both types of attacks like Anomaly based Intrusion Detection and Rule based Intrusion Detection system. First of all the System captures the packets from incoming traffic analyzes it and collects the information about the packet agent monitoring system. Once the Intruder is detected it is sent to honey pot to construct as mitigation point. Honey pot blocks the attacker from the network with knowing the information analysis to block the intruder.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R. Akbani, Korkmaz, T., Raju, G. V. S: Mobile ad hoc network security. In: Lecture Notes in Electrical Engineering, Springer, vol. 127 (2012) R. Akbani, Korkmaz, T., Raju, G. V. S: Mobile ad hoc network security. In: Lecture Notes in Electrical Engineering, Springer, vol. 127 (2012)
2.
Zurück zum Zitat T. Anantvalee and Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless/Mobile Security. New York: Springer (2008) T. Anantvalee and Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless/Mobile Security. New York: Springer (2008)
3.
Zurück zum Zitat Elhadi, M., Shakshuki, EAACK.: A secure intrusion-detection system for MANETs. In: IEEE Transactions on Industrial Electronics, vol. 60(3) (2013) Elhadi, M., Shakshuki, EAACK.: A secure intrusion-detection system for MANETs. In: IEEE Transactions on Industrial Electronics, vol. 60(3) (2013)
4.
Zurück zum Zitat Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approach. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)CrossRef Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approach. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)CrossRef
5.
Zurück zum Zitat Haldar, N.A.H.: An activity pattern based wireless intrusion detection system. In: Information Technology: pp. 846–847 (2012) Haldar, N.A.H.: An activity pattern based wireless intrusion detection system. In: Information Technology: pp. 846–847 (2012)
6.
Zurück zum Zitat Shen, J.: Network intrusion detection by artificial immune system, IECON, pp. 716–720 (2011) Shen, J.: Network intrusion detection by artificial immune system, IECON, pp. 716–720 (2011)
7.
Zurück zum Zitat Khattab, S., Gobriel, S., Melhem, R., Mosse, D.: Live baiting for service-level DoS attackers. Proceeding of the IEEE INFOCOM (2008) Khattab, S., Gobriel, S., Melhem, R., Mosse, D.: Live baiting for service-level DoS attackers. Proceeding of the IEEE INFOCOM (2008)
8.
Zurück zum Zitat Maciá-Pérez, F.: Network intrusion detection system embedded on a smart sensor, industrial electronics. IEEE Trans. 58(3), 722–732 (2012) Maciá-Pérez, F.: Network intrusion detection system embedded on a smart sensor, industrial electronics. IEEE Trans. 58(3), 722–732 (2012)
9.
Zurück zum Zitat Randiranosolo, A.S.: An Artificial immune system based on Holland’s classifier as network intrusion detection. Mach. Learn. Approaches 1, 504–507 (2012) Randiranosolo, A.S.: An Artificial immune system based on Holland’s classifier as network intrusion detection. Mach. Learn. Approaches 1, 504–507 (2012)
10.
Zurück zum Zitat Sridevi, R.: Genetic algorithm and artificial immune systems: a combinational approach for network intrusion detection. In: Advances in Engineering sciences and Management, pp. 494–498 (2012) Sridevi, R.: Genetic algorithm and artificial immune systems: a combinational approach for network intrusion detection. In: Advances in Engineering sciences and Management, pp. 494–498 (2012)
11.
Zurück zum Zitat Thai, M.T., Xuan, Y., Shin, I., Znati, T.: On detection of malicious users using group testing techniques. In: Proceeding of the International Conference Distributed Computing Systems (ICDCS) (2008) Thai, M.T., Xuan, Y., Shin, I., Znati, T.: On detection of malicious users using group testing techniques. In: Proceeding of the International Conference Distributed Computing Systems (ICDCS) (2008)
12.
Zurück zum Zitat Vokorokos, L.: Host based intrusion detection system In: Intelligent Engineering Systems (INES), pp. 43–47 (2010) Vokorokos, L.: Host based intrusion detection system In: Intelligent Engineering Systems (INES), pp. 43–47 (2010)
13.
Zurück zum Zitat Sumner, K.: Honeypots security on offense, security architecture vol. 774(716) (2012) Sumner, K.: Honeypots security on offense, security architecture vol. 774(716) (2012)
14.
Zurück zum Zitat Kheirkhah, E., Amin, S.M.P.: Experimental study of SSH attacks by using honeypot decoys. Indian J. Sci. Technol. 6(12), 5567–5578 (2013) Kheirkhah, E., Amin, S.M.P.: Experimental study of SSH attacks by using honeypot decoys. Indian J. Sci. Technol. 6(12), 5567–5578 (2013)
15.
Zurück zum Zitat Spitzner, L.: Honeypots: Tracking Hackers. Addison-Weasley, Boston (2013) Spitzner, L.: Honeypots: Tracking Hackers. Addison-Weasley, Boston (2013)
16.
Zurück zum Zitat Spitzner, L.: The value of honeypots, part one: definitions and value of honeypots. Security Focus (2001) Spitzner, L.: The value of honeypots, part one: definitions and value of honeypots. Security Focus (2001)
17.
Zurück zum Zitat Karthik, S., Samudrala, B., Yang, A.T.: Design of network security projects using honeypots. J. Comput. Sci. Coll. 20(4), 282–293 (2014) Karthik, S., Samudrala, B., Yang, A.T.: Design of network security projects using honeypots. J. Comput. Sci. Coll. 20(4), 282–293 (2014)
18.
Zurück zum Zitat Dankova, E et al.: An anomaly-based intrusion detection system, In: Electrical Engineering and Informatics 2, Kosice, ISBN 978-80-553-0611-7 (2011) Dankova, E et al.: An anomaly-based intrusion detection system, In: Electrical Engineering and Informatics 2, Kosice, ISBN 978-80-553-0611-7 (2011)
19.
Zurück zum Zitat Tambunan, B., Raharjo, W.S., Purwadi, J.: Implementation of honeypot detection and intrusion prevention system. ULTIMA Comput. 5, 1–7 (2013)CrossRef Tambunan, B., Raharjo, W.S., Purwadi, J.: Implementation of honeypot detection and intrusion prevention system. ULTIMA Comput. 5, 1–7 (2013)CrossRef
20.
Zurück zum Zitat Joshi, R.C., Sardana, A.: Honeypots: A New Paradigm to Information Security. Science Publishers, Rawalpindi (2011)CrossRef Joshi, R.C., Sardana, A.: Honeypots: A New Paradigm to Information Security. Science Publishers, Rawalpindi (2011)CrossRef
21.
Zurück zum Zitat Joseph, S.G.: Advanced honeypot architecture for network threats quantification. Int. J. Sci. Eng. Appl. Sci. 15, 2395–3470 (2015) Joseph, S.G.: Advanced honeypot architecture for network threats quantification. Int. J. Sci. Eng. Appl. Sci. 15, 2395–3470 (2015)
22.
Zurück zum Zitat Wafi, H., Fiade, A.: Implementation of a modern security systems honeypot honey network on wireless networks . EEE (2017) Wafi, H., Fiade, A.: Implementation of a modern security systems honeypot honey network on wireless networks . EEE (2017)
23.
Zurück zum Zitat Moore, C., Al-Nemrat, A.: Analysis of Honeypot Programs and the Attack Data Collected. Springer International Publishing Switzerland, Cham (2015)CrossRef Moore, C., Al-Nemrat, A.: Analysis of Honeypot Programs and the Attack Data Collected. Springer International Publishing Switzerland, Cham (2015)CrossRef
24.
Zurück zum Zitat Bhanu, S., Khilari, G., Kumar, V.: Analysis of SSH Attacks Darknet using Honeypot. Int. J. Eng. Dev. Res. (IJEDR) 3(1), 348–350 (2014) Bhanu, S., Khilari, G., Kumar, V.: Analysis of SSH Attacks Darknet using Honeypot. Int. J. Eng. Dev. Res. (IJEDR) 3(1), 348–350 (2014)
25.
Zurück zum Zitat Narote, S., Khanna, S.: dvance honeypot system for analysing network security. Depart. Comput. Eng. 19, 65–70 (2014) Narote, S., Khanna, S.: dvance honeypot system for analysing network security. Depart. Comput. Eng. 19, 65–70 (2014)
26.
Zurück zum Zitat Fern´andez, D., Ruiz, F.J., Bellido, L., Pastor, E., Omar, W., Mateos, V.: Enhancing learning experience in computer networking through a virtualization-based laboratory model. Int. J. Eng. Educ. 32(6), 2569–2584 (2016) Fern´andez, D., Ruiz, F.J., Bellido, L., Pastor, E., Omar, W., Mateos, V.: Enhancing learning experience in computer networking through a virtualization-based laboratory model. Int. J. Eng. Educ. 32(6), 2569–2584 (2016)
Metadaten
Titel
Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model
verfasst von
A. Umamaheswari
B. Kalaavathi
Publikationsdatum
08.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2173-4

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe