Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization Technique

نویسنده

  • M. Sithara
چکیده

M.Sithara Department of Computer Science, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] M.Chandran Department of Computer Applications, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] G.Padmavathi Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore-43 Email: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With trends and technologies, developments and deployments, network communication has become vital and inevitable with human beings. On the other side, a network communication without security is powerless. There are so many technologies and developments have been rooted to provide a secure and an efficient means of communication through network. Parallel to this, network threats and attacks are also trendy and much technologized. In order to detect such a kind of threats and attacks, this research work proposes honeypot technology. Honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound from the compromised system. This research work implements a kind of honeypot called Secure Shell (SSH) honeypot. SSH honeypot is a secure communication channel which allows users to remotely control computer systems. With the implementation of SSH honeypot, this research work collects the incoming and outgoing traffic data in a network. The collected traffic data can be then analyzed to detect outliers in order to find the abnormal or malicious traffic. This research work detects outliers from the collected SSH honeypot data using Particle Swarm Optimization technique which belongs to the category of cluster-based outlier detection method. With experiments and results, Particle Swarm Optimization shows best results in detecting outliers and has best cost function when compared to other cluster-based algorithms like Genetic Algorithm and Differential Evolution algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Design of Shell-and-Tube Heat Exchanger Based on Particle Swarm Optimization Technique

The paper studies optimization of shell-and-tube heat exchangers using the particle swarm optimization technique. A total cost function is formulated based on initial and annual operating costs of the heat exchangers. Six variables – shell inside diameter, tube diameter, baffle spacing, baffle cut, number of tube passes and tube layouts (triangular or square) – are considered as the design para...

متن کامل

A Swarm Negative Selection Algorithm for Email Spam Detection

The increased nature of email spam with the use of urge mailing tools prompt the need for detector generation to counter the menace of unsolocited email. Detector generation inspired by the human immune system implements particle swarm optimization (PSO) to generate detector in negative selection algorithm (NSA). Outlier detectors are unique features generated by local outlier factor (LOF). The...

متن کامل

Optimal Rotor Fault Detection in Induction Motor Using Particle-Swarm Optimization Optimized Neural Network

This study examined and presents an effective method for detection of failure of conductor bars in the winding of rotor of induction motor in low load conditions using neural networks of radial-base functions. The proposed method used Hilbert method to obtain the stator current signal push. The frequency and signal amplitude of the push stator were used as the input of the neural network and th...

متن کامل

INVERSE FREQUENCY RESPONSE ANALYSIS FOR PIPELINES LEAK DETECTION USING THE PARTICLE SWARM OPTIMIZATION

Inverse Transient Analysis (ITA) is a powerful approach for leak detection of pipelines. When the pipe transient flow is analyzed in frequency domain the ITA is called Inverse Frequency Response Analysis (IFRA). To implement an IFRA for leak detection, a transient state is initiated in the pipe by fast closure of the downstream end valve. Then, the pressure time history at the valve location is...

متن کامل

A TWO-STAGE DAMAGE DETECTION METHOD FOR LARGE-SCALE STRUCTURES BY KINETIC AND MODAL STRAIN ENERGIES USING HEURISTIC PARTICLE SWARM OPTIMIZATION

In this study, an approach for damage detection of large-scale structures is developed by employing kinetic and modal strain energies and also Heuristic Particle Swarm Optimization (HPSO) algorithm. Kinetic strain energy is employed to determine the location of structural damages. After determining the suspected damage locations, the severity of damages is obtained based on variations of modal ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017