Network Security in Organizations using Intrusion Detection System based on Honeypots

1
Mukta Rao
Mukta Rao
2
Dr. Mukta Rao
Dr. Mukta Rao
3
Dr. Nipur
Dr. Nipur
1 Bhagwant University

Send Message

To: Author

GJCST Volume 12 Issue E16

Article Fingerprint

ReserarchID

CSTNWSK7147

Network Security in Organizations using Intrusion Detection System based on Honeypots Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost relevance and honeypots are promising tools for information and understanding of “areas of interest” of the attackers, and the possible relationship between blackhat teams. In this situation, people are increasingly trying to prevent their network security using traditional mechanisms, including firewalls, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a practitioner security, of course, they are tools that are intended to be attacked or interacted with other information about the attackers, their motives and tools. In this paper, we describe a comparative analysis of various IDS and their usefulness on various aspects. Two major categories of HoneyPot viz. low interaction honeypot and high-interaction honeypot have also been discussed in detail. In this paper, lowinteraction honeypot is used as a traffic filter. Activities such as port scanning can be effectively detected by the weak interaction honeypot and stop there. Traffic that cannot be processed by the weak interaction honeypot is delivered over high-interaction honeypot. In this case, the weak interaction honeypot is used as a proxy for high-interaction honeypot then offer optimal realism.

20 Cites in Articles

References

  1. T Sobh (2006). Wire and wireless intrusion detection system: classification, good characteristics and state of art.
  2. G Münz,S Li,G Carle (2007). Traffic anomaly detection using K-means clustering.
  3. Meharouech Sourour,Bouhoula Adel,Abbes Tarek (2009). Ensuring security in depth based on heterogeneous network security technologies.
  4. (2009). Unknown Title.
  5. L Spitzner (2002). Honeypots: Tracking Hackers.
  6. Development of the Honeyd Virtual Honeypot.
  7. Patricia Vit (2012). Melipona favosa Pot-Honey from Venezuela.
  8. A Pfoh (2016). The attackers can be anywhere – Results of a Honeynet project of a small town German water works – In an eight-month honeynet project, TÜV SÜD recorded over 60,000 attempts to break into a virtual wat....
  9. Theuns Verwoerd,Ray Hunt (2002). Intrusion detection techniques and approaches.
  10. Ryan Talabis (2007). Honeypots 101: A Honeypot By Any Other Name.
  11. Fred Cohen (1998). The Deception ToolKit.
  12. Niels Provos (2004). A Virtual Honeypot Framework.
  13. Lance Spitzner (2002). Profile.
  14. Ryan Talabis (2007). Honeypots 101: A Brief History of Honeypots.
  15. K Anagnostakis (2005). Detecting targeted attacks using shadow honeypots.
  16. Xing-Yun He,Kwok-Yan Lam,Siu-Leung Chung,Chi-Hung Chi,Jia-Guang Sun (2004). Real-Time Emulation of Intrusion Victim in HoneyFarm.
  17. B Mukherjee,L Heberlein,K Levitt (1994). Network intrusion detection.
  18. (2008). Know Your Enemy: Honeynets.
  19. David Wagner,Paolo Soto (2002). Mimicry attacks on host-based intrusion detection systems.
  20. Alefiya Hussain,John Heidemann,Christos Papadopoulos (2003). A framework for classifying denial of service attacks.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Mukta Rao. 2012. \u201cNetwork Security in Organizations using Intrusion Detection System based on Honeypots\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E16): .

Download Citation

Issue Cover
GJCST Volume 12 Issue E16
Pg. 51- 56
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

December 19, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9992
Total Downloads: 2399
2026 Trends
Research Identity (RIN)
Related Research

Published Article

The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost relevance and honeypots are promising tools for information and understanding of “areas of interest” of the attackers, and the possible relationship between blackhat teams. In this situation, people are increasingly trying to prevent their network security using traditional mechanisms, including firewalls, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a practitioner security, of course, they are tools that are intended to be attacked or interacted with other information about the attackers, their motives and tools. In this paper, we describe a comparative analysis of various IDS and their usefulness on various aspects. Two major categories of HoneyPot viz. low interaction honeypot and high-interaction honeypot have also been discussed in detail. In this paper, lowinteraction honeypot is used as a traffic filter. Activities such as port scanning can be effectively detected by the weak interaction honeypot and stop there. Traffic that cannot be processed by the weak interaction honeypot is delivered over high-interaction honeypot. In this case, the weak interaction honeypot is used as a proxy for high-interaction honeypot then offer optimal realism.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Network Security in Organizations using Intrusion Detection System based on Honeypots

Dr. Mukta Rao
Dr. Mukta Rao
Dr. Nipur
Dr. Nipur

Research Journals