Learning probe attack patterns with honeypots

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rapid growth of internet and internet based applications has given rise to the number of attacks on the network. The way the attacker attacks the system differs from one attacker to the other. The sequence of attack or the signature of an attacker should be stored, analyzed and used to generate rules for mitigating future attack attempts. In this paper, we have deployed honeypot to record the activities of the attacker. While the attacker prepares for an attack, the IDS redirects him to the honeypot. We make the attacker to believe that he is working with the actual system. The activities related to the attack are recorded by the honeypot by interacting with the intruder. The recorded activities are analyzed by the network administrator and the rule database is updated. As a result, we improve the detection accuracy and security of the system using honeypot without any loss or damage to the original system.

Cite

CITATION STYLE

APA

Shendre, K., Sahu, S. K., Dash, R., & Jena, S. K. (2016). Learning probe attack patterns with honeypots. In Smart Innovation, Systems and Technologies (Vol. 44, pp. 363–369). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-81-322-2529-4_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free