Skip to main content
Erschienen in: Cluster Computing 6/2019

16.02.2018

Implementing file and real time based intrusion detections in secure direct method using advanced honeypot

verfasst von: K. Veena, K. Meena

Erschienen in: Cluster Computing | Sonderheft 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intrusion detection need grows with the increase in the count and volume of Internet Traffic and Network. In this paper, intrusion detection system (IDS) is proposed to identify and distinguish the incoming traffic from the clients and traffic originating through the attackers by using the honeypot security mechanism. Load Balancer is designed and implemented in such a way that it differentiates between the incoming traffic from clients, and the traffic that arises through the attackers. When forwarding the request, it discovers if the traffic is an attack on the server and directs it to a different/alternate server called Honey-Pot. The IDS is developed and intensified with two protocols: File-based detection and Real-time based detection. The File based detection works on question model and the Real-time based detection sets priority levels for accessing data. This acts as a secure-direct protocol thereby increasing the Server protection. The Secure direct method prompts an immediate response to define network intrusions and eliminates human interference to identity the intrusions. Further an interaction with IDS is done to decide whether the traffic is a trespasser. If the traffic is found to be an access user the packet is transmitted to server, but if found to be an unauthorized user, then the IDS directly transmits it to the server.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Misra, R., Renu, D.: Cyber crime investigation and network forensic system using honeypot. Int. J. Latest Trends Eng. Technol. 1, 34–40 (2012) Misra, R., Renu, D.: Cyber crime investigation and network forensic system using honeypot. Int. J. Latest Trends Eng. Technol. 1, 34–40 (2012)
2.
Zurück zum Zitat Li, Z.C., Li, X.J., Gong, L , Computer forensics system based on honeypot. In: Proceedings of the Third International Symposium on Computer Science and Computational Technology (ISCSCT’10), August, pp. 336–337 (2010) Li, Z.C., Li, X.J., Gong, L , Computer forensics system based on honeypot. In: Proceedings of the Third International Symposium on Computer Science and Computational Technology (ISCSCT’10), August, pp. 336–337 (2010)
3.
Zurück zum Zitat Vasilomanolakis, E., Karuppayah, S., MÜhlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 55 (2015)CrossRef Vasilomanolakis, E., Karuppayah, S., MÜhlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 55 (2015)CrossRef
4.
Zurück zum Zitat Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the International Conference on Communication, Computing & Security. ACM, 2011, pp. 600–605 (2011) Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the International Conference on Communication, Computing & Security. ACM, 2011, pp. 600–605 (2011)
5.
Zurück zum Zitat Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. Int. J. 4, 63 (2012) Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. Int. J. 4, 63 (2012)
7.
Zurück zum Zitat Vasilomanolakis, E., Karuppayah, S., Kikiras, P. MÜhlhäuser, M.: A honeypot-driven cyber incident monitor: lessons learned and steps ahead. In: Proceedings of the 8th International Conference on Security of Information and Networks. ACM, pp. 158–164 (2015) Vasilomanolakis, E., Karuppayah, S., Kikiras, P. MÜhlhäuser, M.: A honeypot-driven cyber incident monitor: lessons learned and steps ahead. In: Proceedings of the 8th International Conference on Security of Information and Networks. ACM, pp. 158–164 (2015)
8.
Zurück zum Zitat Kaur, T., Malhotra, V., Singh, D.: Comparison of network security tools-Firewall, Intrusion detection system and Honeypot. int. J. Enhanc. Res. Sci. Technol. Eng. 3, 200–204 (2014) Kaur, T., Malhotra, V., Singh, D.: Comparison of network security tools-Firewall, Intrusion detection system and Honeypot. int. J. Enhanc. Res. Sci. Technol. Eng. 3, 200–204 (2014)
9.
Zurück zum Zitat Suo, X., Hue, X., Gao, Y.: Research on the application of honeypot technology in intrusion detection system. IEEE, vol. NA, pp. 1030–1032 (2014) Suo, X., Hue, X., Gao, Y.: Research on the application of honeypot technology in intrusion detection system. IEEE, vol. NA, pp. 1030–1032 (2014)
10.
Zurück zum Zitat Koch, R., Golling, M., Dareo, G.: Attracting sophisticated attacks to secure systems: a new honeypot architecture. IEEE vol. NA, 409–410 (2013) Koch, R., Golling, M., Dareo, G.: Attracting sophisticated attacks to secure systems: a new honeypot architecture. IEEE vol. NA, 409–410 (2013)
11.
Zurück zum Zitat Rathore, P., Jain, N.: Honeypot technique used for intrusion detection system. Int. J. Sci. Eng. Technol. Res. (IJSETR) 2(12) (2013) Rathore, P., Jain, N.: Honeypot technique used for intrusion detection system. Int. J. Sci. Eng. Technol. Res. (IJSETR) 2(12) (2013)
12.
Zurück zum Zitat Mohammadzadeh.e.n, H., Honarbakhsh, R., Zakaria, O.: A survey on dynamic honeypots. Int. J. Inf. Electron. Eng. 2(2) (2012) Mohammadzadeh.e.n, H., Honarbakhsh, R., Zakaria, O.: A survey on dynamic honeypots. Int. J. Inf. Electron. Eng. 2(2) (2012)
13.
Zurück zum Zitat Somwanshi, A.A., Joshi, S.A.: Implementation of honeypots for server security. Int. Res. J. Eng. Technol. 03(03), 285–288 (2016) Somwanshi, A.A., Joshi, S.A.: Implementation of honeypots for server security. Int. Res. J. Eng. Technol. 03(03), 285–288 (2016)
14.
Zurück zum Zitat Nawrocki, M., Wählisch, M., Schmidty, T.C., Keilz, C., Schonfelderz, J.: Survey on honeypot software and data analysis. All content following this page was uploaded by Christian Keil on 17 October (2016) Nawrocki, M., Wählisch, M., Schmidty, T.C., Keilz, C., Schonfelderz, J.: Survey on honeypot software and data analysis. All content following this page was uploaded by Christian Keil on 17 October (2016)
15.
Zurück zum Zitat Mirza, M., Usman, M., Biuk-Aghai, R.P., Fong, S.: A modular approach for implementation of honeypots in cyber security. Int. J. Appl. Eng. Res. 11(8), 5446–5451 (2016) Mirza, M., Usman, M., Biuk-Aghai, R.P., Fong, S.: A modular approach for implementation of honeypots in cyber security. Int. J. Appl. Eng. Res. 11(8), 5446–5451 (2016)
16.
Zurück zum Zitat Malav, S., Avinash, M.S., Satish, N.S., Sandeep, S.C.: Network security using IDS, IPS & honeypot. Int. J. Recent Res. Math. Comput. Sci. Inf. Technol. 2(2), 27–30 (2015–2016). www.paperpublications.org Malav, S., Avinash, M.S., Satish, N.S., Sandeep, S.C.: Network security using IDS, IPS & honeypot. Int. J. Recent Res. Math. Comput. Sci. Inf. Technol. 2(2), 27–30 (2015–2016). www.​paperpublication​s.​org
18.
Zurück zum Zitat Fowler, S., Zeadally, S., Chilamkurti, N.: Impact of denial of service solutions on network quality of service. Secur. Commun. Netw. 4(10), 1089–1103 (2011)CrossRef Fowler, S., Zeadally, S., Chilamkurti, N.: Impact of denial of service solutions on network quality of service. Secur. Commun. Netw. 4(10), 1089–1103 (2011)CrossRef
Metadaten
Titel
Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
verfasst von
K. Veena
K. Meena
Publikationsdatum
16.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 6/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1912-x

Weitere Artikel der Sonderheft 6/2019

Cluster Computing 6/2019 Zur Ausgabe