Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention

نویسندگان

چکیده

Intrusion Detection Systems and Prevention are used to detect prevent attacks/malware from entering the network/system. Honeypot is a type of System which find intruder, study intruder access original system. It necessary build strong honeypot because if it compromised, system can be easily targeted by attacker. To overcome such challenges an efficient needed that shut attacker after extracting his attack technique tools. In this paper, Venus fly-trap optimization algorithm has been for implementing along with System. plants carnivorous catch their prey intelligently. By adopting feature we make effective will intelligently interact A new fitness function proposed identify size The effectiveness evaluated comparing state art. For comparison, remote-to-local attacks, probing attacks DOS performed on both existing models. model significant catch/block all intruders were caught art also reduces time interaction between thereby giving minimum information

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Dynamic Honeypot Design for Intrusion Detection

A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhatcommunity), thus deriving their value from the unauthorized use of their resources. This paper discusses ...

متن کامل

Intrusion Detection System (IDS) Evaluation

This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...

متن کامل

Towards a new approach for intrusion detection with intelligent agents

In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...

متن کامل

Intrusion Detection System Using Shadow Honeypot

The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...

متن کامل

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure

Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Tradit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2022

ISSN: ['1572-834X', '0929-6212']

DOI: https://doi.org/10.1007/s11277-022-09988-1