The rapid growth of internet and internet based applications has given rise to the number of attacks on the network. The way the attacker attacks the system differs from one attacker to the other. The sequence of attack or the signature of an attacker should be stored, analyzed and used to generate rules for mitigating future attack attempts. In this paper, we have deployed honeypot to record the activities of the attacker. While the attacker prepares for an attack, the IDS redirects him to the honeypot. We make the attacker to believe that he is working with the actual system. The activities related to the attack are recorded by the honeypot by interacting with the intruder. The recorded activities are analyzed by the network administrator and the rule database is updated. As a result, we improve the detection accuracy and security of the system using honeypot without any loss or damage to the original system.
CITATION STYLE
Shendre, K., Sahu, S. K., Dash, R., & Jena, S. K. (2016). Learning probe attack patterns with honeypots. In Smart Innovation, Systems and Technologies (Vol. 44, pp. 363–369). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-81-322-2529-4_38
Mendeley helps you to discover research relevant for your work.