Honey pot: A major technique for intrusion detection

Rajalakshmi Selvaraj, Venu Madhav Kuthadi, Tshilidzi Marwala

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Generally, Intrusion detection system (IDS) is installed in industrial environment for protecting network that works based on signature, where they are not capable of detecting most unidentified attacks. The detection of undefined attack and intrusion is not more helpful to identify the several kinds of attack, where intrusion-based attack has become a challenging task to detect intruder on network. A skilled attacker can obtain a sensible information and data from the system after knowing the weakness. Distributed denial of service (DDoS) is a major thread over the security and most enlarging thread in recent days. There are so many types of Denial of Service (DoS) such as Teardrop, Smurf, Ping of Death, and Clone attack. The aim of the cyber defense system is to detect the main cause of the several counter attacks on the enterprise network. On the way to fix these issues, we are proposing a novel idea that relies on honey pot technique and packet data analysis which are trained by the sample of malware after using the Intrusion detection technique in both ways separately as Network and Anomaly intrusion detection system. Some approaches are not being easily implemented in the network of real enterprises, because of practicability training system which is trained by the sample of malware or deep analysis of packet inspection or depends on the host-based technique that requires a big capacity for storage over the enterprise. The honey pots are one of the most successful techniques to collect the sample of malware for the purpose of analysis and identification of attacks. Honey pot is a novel technology which consists of massive energy and possibilities in the field of security. It helps reading the behavior of the attack and attacker information.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015
EditorsJyotsna Kumar Mandal, Vikrant Bhateja, Suresh Chandra Satapathy, K. Srujan Raju
PublisherSpringer Verlag
Pages73-82
Number of pages10
ISBN (Print)9788132225225
DOIs
Publication statusPublished - Jan 1 2016
Event2nd International Conference on Computer and Communication Technologies, IC3T 2015 - Hyderabad, India
Duration: Jul 24 2015Jul 26 2015

Publication series

NameAdvances in Intelligent Systems and Computing
Volume380
ISSN (Print)2194-5357

Other

Other2nd International Conference on Computer and Communication Technologies, IC3T 2015
CountryIndia
CityHyderabad
Period7/24/157/26/15

Fingerprint

Intrusion detection
Industry
Inspection
Malware

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Selvaraj, R., Kuthadi, V. M., & Marwala, T. (2016). Honey pot: A major technique for intrusion detection. In J. K. Mandal, V. Bhateja, S. C. Satapathy, & K. S. Raju (Eds.), Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015 (pp. 73-82). (Advances in Intelligent Systems and Computing; Vol. 380). Springer Verlag. https://doi.org/10.1007/978-81-322-2523-2_7
Selvaraj, Rajalakshmi ; Kuthadi, Venu Madhav ; Marwala, Tshilidzi. / Honey pot : A major technique for intrusion detection. Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. editor / Jyotsna Kumar Mandal ; Vikrant Bhateja ; Suresh Chandra Satapathy ; K. Srujan Raju. Springer Verlag, 2016. pp. 73-82 (Advances in Intelligent Systems and Computing).
@inproceedings{19f74c73aa114c219c28159124f48688,
title = "Honey pot: A major technique for intrusion detection",
abstract = "Generally, Intrusion detection system (IDS) is installed in industrial environment for protecting network that works based on signature, where they are not capable of detecting most unidentified attacks. The detection of undefined attack and intrusion is not more helpful to identify the several kinds of attack, where intrusion-based attack has become a challenging task to detect intruder on network. A skilled attacker can obtain a sensible information and data from the system after knowing the weakness. Distributed denial of service (DDoS) is a major thread over the security and most enlarging thread in recent days. There are so many types of Denial of Service (DoS) such as Teardrop, Smurf, Ping of Death, and Clone attack. The aim of the cyber defense system is to detect the main cause of the several counter attacks on the enterprise network. On the way to fix these issues, we are proposing a novel idea that relies on honey pot technique and packet data analysis which are trained by the sample of malware after using the Intrusion detection technique in both ways separately as Network and Anomaly intrusion detection system. Some approaches are not being easily implemented in the network of real enterprises, because of practicability training system which is trained by the sample of malware or deep analysis of packet inspection or depends on the host-based technique that requires a big capacity for storage over the enterprise. The honey pots are one of the most successful techniques to collect the sample of malware for the purpose of analysis and identification of attacks. Honey pot is a novel technology which consists of massive energy and possibilities in the field of security. It helps reading the behavior of the attack and attacker information.",
author = "Rajalakshmi Selvaraj and Kuthadi, {Venu Madhav} and Tshilidzi Marwala",
year = "2016",
month = "1",
day = "1",
doi = "10.1007/978-81-322-2523-2_7",
language = "English",
isbn = "9788132225225",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "73--82",
editor = "Mandal, {Jyotsna Kumar} and Vikrant Bhateja and Satapathy, {Suresh Chandra} and Raju, {K. Srujan}",
booktitle = "Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015",
address = "Germany",

}

Selvaraj, R, Kuthadi, VM & Marwala, T 2016, Honey pot: A major technique for intrusion detection. in JK Mandal, V Bhateja, SC Satapathy & KS Raju (eds), Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. Advances in Intelligent Systems and Computing, vol. 380, Springer Verlag, pp. 73-82, 2nd International Conference on Computer and Communication Technologies, IC3T 2015, Hyderabad, India, 7/24/15. https://doi.org/10.1007/978-81-322-2523-2_7

Honey pot : A major technique for intrusion detection. / Selvaraj, Rajalakshmi; Kuthadi, Venu Madhav; Marwala, Tshilidzi.

Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. ed. / Jyotsna Kumar Mandal; Vikrant Bhateja; Suresh Chandra Satapathy; K. Srujan Raju. Springer Verlag, 2016. p. 73-82 (Advances in Intelligent Systems and Computing; Vol. 380).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Honey pot

T2 - A major technique for intrusion detection

AU - Selvaraj, Rajalakshmi

AU - Kuthadi, Venu Madhav

AU - Marwala, Tshilidzi

PY - 2016/1/1

Y1 - 2016/1/1

N2 - Generally, Intrusion detection system (IDS) is installed in industrial environment for protecting network that works based on signature, where they are not capable of detecting most unidentified attacks. The detection of undefined attack and intrusion is not more helpful to identify the several kinds of attack, where intrusion-based attack has become a challenging task to detect intruder on network. A skilled attacker can obtain a sensible information and data from the system after knowing the weakness. Distributed denial of service (DDoS) is a major thread over the security and most enlarging thread in recent days. There are so many types of Denial of Service (DoS) such as Teardrop, Smurf, Ping of Death, and Clone attack. The aim of the cyber defense system is to detect the main cause of the several counter attacks on the enterprise network. On the way to fix these issues, we are proposing a novel idea that relies on honey pot technique and packet data analysis which are trained by the sample of malware after using the Intrusion detection technique in both ways separately as Network and Anomaly intrusion detection system. Some approaches are not being easily implemented in the network of real enterprises, because of practicability training system which is trained by the sample of malware or deep analysis of packet inspection or depends on the host-based technique that requires a big capacity for storage over the enterprise. The honey pots are one of the most successful techniques to collect the sample of malware for the purpose of analysis and identification of attacks. Honey pot is a novel technology which consists of massive energy and possibilities in the field of security. It helps reading the behavior of the attack and attacker information.

AB - Generally, Intrusion detection system (IDS) is installed in industrial environment for protecting network that works based on signature, where they are not capable of detecting most unidentified attacks. The detection of undefined attack and intrusion is not more helpful to identify the several kinds of attack, where intrusion-based attack has become a challenging task to detect intruder on network. A skilled attacker can obtain a sensible information and data from the system after knowing the weakness. Distributed denial of service (DDoS) is a major thread over the security and most enlarging thread in recent days. There are so many types of Denial of Service (DoS) such as Teardrop, Smurf, Ping of Death, and Clone attack. The aim of the cyber defense system is to detect the main cause of the several counter attacks on the enterprise network. On the way to fix these issues, we are proposing a novel idea that relies on honey pot technique and packet data analysis which are trained by the sample of malware after using the Intrusion detection technique in both ways separately as Network and Anomaly intrusion detection system. Some approaches are not being easily implemented in the network of real enterprises, because of practicability training system which is trained by the sample of malware or deep analysis of packet inspection or depends on the host-based technique that requires a big capacity for storage over the enterprise. The honey pots are one of the most successful techniques to collect the sample of malware for the purpose of analysis and identification of attacks. Honey pot is a novel technology which consists of massive energy and possibilities in the field of security. It helps reading the behavior of the attack and attacker information.

UR - http://www.scopus.com/inward/record.url?scp=84945927844&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84945927844&partnerID=8YFLogxK

U2 - 10.1007/978-81-322-2523-2_7

DO - 10.1007/978-81-322-2523-2_7

M3 - Conference contribution

AN - SCOPUS:84945927844

SN - 9788132225225

T3 - Advances in Intelligent Systems and Computing

SP - 73

EP - 82

BT - Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015

A2 - Mandal, Jyotsna Kumar

A2 - Bhateja, Vikrant

A2 - Satapathy, Suresh Chandra

A2 - Raju, K. Srujan

PB - Springer Verlag

ER -

Selvaraj R, Kuthadi VM, Marwala T. Honey pot: A major technique for intrusion detection. In Mandal JK, Bhateja V, Satapathy SC, Raju KS, editors, Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. Springer Verlag. 2016. p. 73-82. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-81-322-2523-2_7