Skip to main content
Log in

Implementing file and real time based intrusion detections in secure direct method using advanced honeypot

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Intrusion detection need grows with the increase in the count and volume of Internet Traffic and Network. In this paper, intrusion detection system (IDS) is proposed to identify and distinguish the incoming traffic from the clients and traffic originating through the attackers by using the honeypot security mechanism. Load Balancer is designed and implemented in such a way that it differentiates between the incoming traffic from clients, and the traffic that arises through the attackers. When forwarding the request, it discovers if the traffic is an attack on the server and directs it to a different/alternate server called Honey-Pot. The IDS is developed and intensified with two protocols: File-based detection and Real-time based detection. The File based detection works on question model and the Real-time based detection sets priority levels for accessing data. This acts as a secure-direct protocol thereby increasing the Server protection. The Secure direct method prompts an immediate response to define network intrusions and eliminates human interference to identity the intrusions. Further an interaction with IDS is done to decide whether the traffic is a trespasser. If the traffic is found to be an access user the packet is transmitted to server, but if found to be an unauthorized user, then the IDS directly transmits it to the server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Misra, R., Renu, D.: Cyber crime investigation and network forensic system using honeypot. Int. J. Latest Trends Eng. Technol. 1, 34–40 (2012)

    Google Scholar 

  2. Li, Z.C., Li, X.J., Gong, L , Computer forensics system based on honeypot. In: Proceedings of the Third International Symposium on Computer Science and Computational Technology (ISCSCT’10), August, pp. 336–337 (2010)

  3. Vasilomanolakis, E., Karuppayah, S., MÜhlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 55 (2015)

    Article  Google Scholar 

  4. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the International Conference on Communication, Computing & Security. ACM, 2011, pp. 600–605 (2011)

  5. Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. Int. J. 4, 63 (2012)

    Google Scholar 

  6. Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 1(2), 15–23 (2003). https://doi.org/10.1109/MSECP.2003.1193207

    Article  Google Scholar 

  7. Vasilomanolakis, E., Karuppayah, S., Kikiras, P. MÜhlhäuser, M.: A honeypot-driven cyber incident monitor: lessons learned and steps ahead. In: Proceedings of the 8th International Conference on Security of Information and Networks. ACM, pp. 158–164 (2015)

  8. Kaur, T., Malhotra, V., Singh, D.: Comparison of network security tools-Firewall, Intrusion detection system and Honeypot. int. J. Enhanc. Res. Sci. Technol. Eng. 3, 200–204 (2014)

    Google Scholar 

  9. Suo, X., Hue, X., Gao, Y.: Research on the application of honeypot technology in intrusion detection system. IEEE, vol. NA, pp. 1030–1032 (2014)

  10. Koch, R., Golling, M., Dareo, G.: Attracting sophisticated attacks to secure systems: a new honeypot architecture. IEEE vol. NA, 409–410 (2013)

  11. Rathore, P., Jain, N.: Honeypot technique used for intrusion detection system. Int. J. Sci. Eng. Technol. Res. (IJSETR) 2(12) (2013)

  12. Mohammadzadeh.e.n, H., Honarbakhsh, R., Zakaria, O.: A survey on dynamic honeypots. Int. J. Inf. Electron. Eng. 2(2) (2012)

  13. Somwanshi, A.A., Joshi, S.A.: Implementation of honeypots for server security. Int. Res. J. Eng. Technol. 03(03), 285–288 (2016)

    Google Scholar 

  14. Nawrocki, M., Wählisch, M., Schmidty, T.C., Keilz, C., Schonfelderz, J.: Survey on honeypot software and data analysis. All content following this page was uploaded by Christian Keil on 17 October (2016)

  15. Mirza, M., Usman, M., Biuk-Aghai, R.P., Fong, S.: A modular approach for implementation of honeypots in cyber security. Int. J. Appl. Eng. Res. 11(8), 5446–5451 (2016)

    Google Scholar 

  16. Malav, S., Avinash, M.S., Satish, N.S., Sandeep, S.C.: Network security using IDS, IPS & honeypot. Int. J. Recent Res. Math. Comput. Sci. Inf. Technol. 2(2), 27–30 (2015–2016). www.paperpublications.org

  17. Bijone, M.: A survey on secure network: intrusion detection & prevention approaches. Am. J. Inf. Syst. 4(3), 69–88 http://pubs.sciepub.com/ajis/4/3/2 ©Science and Education Publishing, https://doi.org/10.12691/ajis-4-3-2(2016)

  18. Fowler, S., Zeadally, S., Chilamkurti, N.: Impact of denial of service solutions on network quality of service. Secur. Commun. Netw. 4(10), 1089–1103 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Meena.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Veena, K., Meena, K. Implementing file and real time based intrusion detections in secure direct method using advanced honeypot. Cluster Comput 22 (Suppl 6), 13361–13368 (2019). https://doi.org/10.1007/s10586-018-1912-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1912-x

Keywords

Navigation