The title of this work is Honey Pot Intrusion Detection and Prevention Systems. Intrusion is a major threat to security in computer and network systems. A network attack is an illegal intentional effort to compromise network security by gaining access to information, manipulating the same thereb
Intrusion Detection And Prevention Systems Using Novel Honeypot
The title of this work is Honey Pot Intrusion Detection and Prevention Systems. Intrusion is a major threat to security in
computer and network systems. A network attack is an illegal intentional effort to compromise network security by gaining access to information, manipulating the same thereby rendering a system untrustworthy. This, arises from the fact that as, experts seek means to tackle intrusion, would be intruders are also working tirelessly hard at devising ways to perpetrate their unlawful activities, necessitating a need for the deployment of IDPS to prevent the intrusion by attackers into what is meant to be a secure system, and the advancement of future safeguards against malicious attacks. In this study, a honeypot based approach is proposed, which
can be used on the network security for the real-time intrusion detection and prevention systems. For this proposed novel approach, an effective software tool was developed. The developed system is a hybrid honeypot that combines the superior properties of low and high interaction honeypots in a single structure. The honeypot looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate target. Once the hackers are in, they can be tracked, and their behavior assessed for clues on how to make the real network more secure.
In order to ensure the security of information systems, a honeypot-based approach for real time intrusion detection and prevention systems (IDPS) is proposed. In which we trap the attackers and make system more secure.
In our application work to monitor enterprise network traffic, analyze it to avoid malicious activities, a honeypot-based attack detection and prevention design has been developed. The basis components of this developed application can be viewed in three groups, namely “the honeypot server application” that can simulate trap systems, “the monitor application” on which can be displayed the animations that are detected from honeypot communication server, and by this monitor application honeypot server application configurations done, and “the IDS application” which is a server application where the packets come to the honeypot server by trapping are sent to the monitor.
The developed system is honeypot based IDPS type that visualizes the network traffic on servers in real-time animation, similar to the global live attack maps. Global live attack maps can be used to see real global attacks, especially in real-time. Our developed system presents a live attack map of a real server traffic as an instance of a campus network, which can be used by any corporate or institutional network as well.
The honeypot server, monitor and IDS applications by the virtualization technology have been logically separated from each other and they have been provided to run on a physical machine. Thereby, if the intruder compromises the honeypot that it has been trapped by, possible risks will have been minimized.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Routers and switches | Equipment | 2 | 35000 | 70000 |
| Printing, etc | Miscellaneous | 10 | 1000 | 10000 |
| Total in (Rs) | 80000 |
Confronting the pandemic of COVID-19, is nowadays one of the most prominent challenges of...
Security has always been a concern for people since the beginning. Everyone wants to feel...
Our project is to make the world first smart shirt and smart wearable device specific...
There are two main concepts that are proposed in this project i.e. net metering using gree...
When compared to tumors in other parts of the body, the brain tumor has become one of the...