skip to main content
10.1145/3331453.3360983acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Honeynet Construction Based on Intrusion Detection

Published: 22 October 2019 Publication History

Abstract

As a network defense technology, honeypot can take the initiative to respond to external attacks, with high reliability and convenient management. In the current complex industrial control network situation, honeypot as a defense tool can maximize the protection of data resources. In this paper, we design a honeynet-based intrusion detection system. It captures the actual traffic and uses support vector machine (SVM) algorithm to study the intrusion behavior based on the KDDCUP99 dataset. The experimental results show that the detection accuracy of intrusion behavior in the monitored network is up to 89%.

References

[1]
Galloway B and Hancke G P (2013). Introduction to Industrial Control Networks. IEEE Communications Surveys & Tutorials, 15(2):860--880.
[2]
Knapp E and Broad J (2014). Industrial network security: securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems. Syngress
[3]
K Stouffer J Falco K (2011). Scarfone "Guide to industrial control systems (ICS) security" in Washington DC USA Jun.
[4]
ÁLVARO HERRERO, Zurutuza U and Corchado E A (2012). Neural-Visualization IDS For Honeynet Data. International Journal of Neural Systems, 22(02):1250005-1-1250005-18.
[5]
Harrington P (2012). Machine Learning in Action. Machine learning in action.
[6]
Garnacho A R and Raya A A (2015). An Overview of Information Security. Advances In Artificial Intelligence For Privacy Protection And Security.
[7]
Li H, Chen J and Jin X (2011). An outlook on network honeypot. International Conference on Computer Science & Service System. IEEE.
[8]
Heng-Ru Z and Jie G (2011). Research and Design of Network Attack and Defense Platform Based on Virtual Honeynet. Computational and Information Sciences (ICCIS), 2010 International Conference on. IEEE.
[9]
R Venkatesan, G Ashwin Kumar and M R Nandhan (2018). A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT. 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), Pondicherry, pp. 1--6.
[10]
Zhang X, Zeng H and Jia L (2010). Research of intrusion detection system dataset-KDD CUP99. Computer Engineering and Design, 31(22):4809--4812+4816.
[11]
A M Chandrasekhar and K Raghuveer (2014). Confederation of FCM clustering, ANN and SVM techniques to implement hybrid NIDS using corrected KDD cup 99 dataset. 2014 International Conference on Communication and Signal Processing, Melmaruvathur, pp. 672--676.
[12]
Suo X, Han X and Gao Y (2014). Research on the application of honeypot technology in intrusion detection system. 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA). IEEE.

Cited By

View all
  • (2024)HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet ArchitectureElectronics10.3390/electronics1302036113:2(361)Online publication date: 15-Jan-2024
  • (2023)Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future WorksComputers, Materials & Continua10.32604/cmc.2023.03658775:2(3375-3398)Online publication date: 2023
  • (2022)Application of Artificial Intelligence Technology in Honeypot Technology2021 International Conference on Advanced Computing and Endogenous Security10.1109/IEEECONF52377.2022.10013349(01-09)Online publication date: 21-Apr-2022
  • Show More Cited By

Index Terms

  1. Honeynet Construction Based on Intrusion Detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAE '19: Proceedings of the 3rd International Conference on Computer Science and Application Engineering
    October 2019
    942 pages
    ISBN:9781450362948
    DOI:10.1145/3331453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Honeynet
    2. Industrial control network
    3. Intrusion detection
    4. SVM

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • key laboratory of network assessment technology of Institute of Information Engineering, Chinese Academy of Sciences.
    • National Key Research and Development Plan
    • Key Lab of Information Network Security, Ministry of Public Security
    • Special fund on education and teaching reform of Besti
    • the Fundamental Research Funds for the Central Universities

    Conference

    CSAE 2019

    Acceptance Rates

    Overall Acceptance Rate 368 of 770 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet ArchitectureElectronics10.3390/electronics1302036113:2(361)Online publication date: 15-Jan-2024
    • (2023)Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future WorksComputers, Materials & Continua10.32604/cmc.2023.03658775:2(3375-3398)Online publication date: 2023
    • (2022)Application of Artificial Intelligence Technology in Honeypot Technology2021 International Conference on Advanced Computing and Endogenous Security10.1109/IEEECONF52377.2022.10013349(01-09)Online publication date: 21-Apr-2022
    • (2022)Framework for Analyzing Intruder Behavior of IoT Cyber Attacks Based on Network Forensics by Deploying Honeypot Technology2022 5th International Conference on Information and Communications Technology (ICOIACT)10.1109/ICOIACT55506.2022.9971886(423-428)Online publication date: 24-Aug-2022
    • (2022)Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypotWireless Networks10.1007/s11276-022-03057-yOnline publication date: 18-Jul-2022
    • (2021) PCA mix‐based Hotelling's T 2 multivariate control charts for intrusion detection system IET Information Security10.1049/ise2.1205116:3(161-177)Online publication date: 3-Dec-2021
    • (2020)Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System NetworkIEEE Access10.1109/ACCESS.2020.29896128(81582-81593)Online publication date: 2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media