Intrusion Detection System Using Shadow Honeypot
نویسندگان
چکیده
The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from the network. To improve the detection performance of intrusion detection system, shadow honeypot is combined with it. This proposed system may improve the overall security of large scale networks by minimize the rate of false positives and detect better intrusion. Keywords— anomaly detection, intrusion detection system, honeypot, honeynet, shadow honeypot.
منابع مشابه
Honeymaze: a Hybrid Intrusion Detection System
In this paper we discussed, a hybrid intrusion detection system using honey pot. Hybrid honeypot is the combination of low and high interaction honeypots. It helps in detecting intrusion attacking on the system. For this, I have proposed the hybrid model of hybrid honeypot. Low interaction honeypot provide enough interaction to attackers to allow honeypot to detect interesting attacks. It also ...
متن کاملA Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...
متن کاملDesign and Analysis of Distributed Honeypot System
Honeypot technology has been widely used to overcome the limitations of firewall technology, many intrusion detection systems, intrusion prevention systems, which detected several attacks but couldnot detect new attacks. This paper discusses the honeypot technology according to the existed shortage in the honeypot system and proposes a distributed system which remedy the existing deficiency in ...
متن کاملA Distributed IDS for Industrial Control Systems
Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domainspecific approach to cyber threat detection within ICS, which is one of the most import...
متن کاملEnhancing Intrusion Detection System Performance using Firecol Protection Services based Honeypot System
Nowadays, Internet is one among the famous technique to connect each computer all around the world. The development of nonstop communication creates a number of opportunities and also it develops new possibilities for malicious users. As the size and number of the Internet and Network traffic has become greater and the requirement for the Intrusion Detection grows in step to minimize the Inform...
متن کامل