DocumentCode :
260844
Title :
Dynamic & hybrid honeypot model for scalable network monitoring
Author :
Chawda, Kartik ; Patel, Ankit D.
Author_Institution :
Comput. Sci. & Eng. Dept., Paral Inst. of Eng. & Technol., Vadodara, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Advanced Technology in the area of intrusion detection is the Honeypot technology that unlike common IDS s tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypot provide a platform for studying the methods and tools used by the intruders, thus deriving their value from the unauthorized use of their resource. To provide scalable, early warning and analysis of new Internet threats like worms or automated attacks, we propose globally distributed, hybrid monitoring model that can capture and analyze new vulnerabilities and exploits as they occur. To achieve this, our Model increases the exposure of high-interaction honeypots to these threats by employing low-interaction honeypots as frontend content filters. Host-based techniques capture relevant details such as packet payload of attacks while network monitoring provides wide coverage for quick detection and assessment. To reduce the load of the backends, we filter prevalent content at the network frontends and use a novel handoff mechanism to enable interactions between network and host components.
Keywords :
computer network performance evaluation; computer network security; IDS; Internet threats; attack packet payload; backend load reduction; dynamic-and-hybrid honeypot model; early-warning analysis; frontend content filters; globally distributed hybrid monitoring model; handoff mechanism; high-interaction honeypots; host components; host-based techniques; intrusion detection; low-interaction honeypots; network components; network frontends; prevalent content filter; scalable analysis; scalable network monitoring; unauthorized resource use; Educational institutions; Fingerprint recognition; IP networks; Intrusion detection; Monitoring; Operating systems; Servers; Honeypot; IDS; Intrusion Detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7033844
Filename :
7033844
Link To Document :
بازگشت