Abstract
Cyber-intrusions are constantly growing due to the ineffectiveness of the traditional cyber security tools and filtering systems-based attacks detection. In the last decade, significant techniques of machine and deep learning were employed to resolve the cyber security issues. Unfortunately, the results are still imprecise with a lot of shortcomings. In this paper, we present a real-time cyber security agent based on honeypots technology for real-time data collection and a combination of machine learning algorithms for data modeling that enhances modeling accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Matin, I.M.M., Rahardjo, B.: The Use of Honeypot in Machine Learning Based on Malware Detection: A Review. 1–6 (2020)
Matin, I.M.M., Rahardjo, B.: Malware detection using honeypot and machine learning. 7th International Conference on Cyber and IT Service Management 7, 1–4 (2020)
Singh, J., Singh, J.: A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture 101861 (2020)
Iwendi, C., Jalil, Z., Javed, A.R., Reddy, T., Kaluri, R., Srivastava, G., Jo, O.: Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8, 72650–72660 (2020)
Bowman, J.: How the United States is Losing the Fight to Secure Cyberspace. (2021)
Oxford, A.: SolarWinds hack will alter US cyber strategy. Emerald Expert Briefings (2021)
Jiang, K., Zheng, H.: Design and Implementation of A Machine Learning Enhanced Web Honeypot System. pp. 957–961. IEEE, (Year)
Spitzner, L.: Honeypots: tracking hackers. Addison-Wesley Reading (2003)
Karthikeyan, R., Geetha, D.T., Vijayalakshmi, S., Sumitha, R.J.I.j.f.R., Technology, D.i.: Honeypots for network security. 7, 62–66 (2017)
Owezarski, P.: Unsupervised classification and characterization of honeypot attacks. pp. 10–18. IEEE, (2014)
Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10, 122 (2019)
Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences 9, 4396 (2019)
Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: Analysing the rise of IoT compromises. (2015)
Vishwakarma, R., Jain, A.K.: A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks. pp. 1019–1024. IEEE, (Year)
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. pp. 435–442. (2010)
Chou, T.-S., Fan, J., Fan, S., Makki, K.: Ensemble of machine learning algorithms for intrusion detection. pp. 3976–3980. IEEE, (2019)
Feng, G., Zhang, C., Zhang, Q.: A design of linkage security defense system based on honeypot. pp. 70–77. Springer, (2013)
Matin, I.M.M., Rahardjo, B.: Malware detection using honeypot and machine learning. pp. 1–4. IEEE, (2020)
Seungjin, L., Abdullah, A., Jhanjhi, N.Z.: A Review on Honeypot-based Botnet Detection Models for Smart Factory. International Journal of Advanced Computer Science and Applications 11, (2020)
El Kamel, N., Eddabbah, M., Lmoumen, Y., Touahni, R.: A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning. Security and Communication Networks 2020, (2020)
Ng, C.K., Pan, L., Xiang, Y.: Honeypot frameworks and their applications: a new framework. Springer (2018)
Negi, P.S., Garg, A., Lal, R.: Intrusion detection and prevention using honeypot network for cloud security. pp. 129–132. IEEE, (2020)
Wang, H., Wu, B.: SDN-based hybrid honeypot for attack capture. pp. 1602–1606. IEEE, (2019)
Naik, N., Jenkins, P., Savage, N., Yang, L.: A computational intelligence enabled honeypot for chasing ghosts in the wires. Complex & Intelligent Systems 1–18 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
El Kamel, N., Eddabbah, M., Lmoumen, Y., Touahni, R. (2022). A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms. In: Ben Ahmed, M., Teodorescu, HN.L., Mazri, T., Subashini, P., Boudhir, A.A. (eds) Networking, Intelligent Systems and Security. Smart Innovation, Systems and Technologies, vol 237. Springer, Singapore. https://doi.org/10.1007/978-981-16-3637-0_21
Download citation
DOI: https://doi.org/10.1007/978-981-16-3637-0_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3636-3
Online ISBN: 978-981-16-3637-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)