##plugins.themes.academic_pro.article.main##

Abstract

Attacks on the internet keep on increasing and it causes harm to our security system. In order to minimize this threat, it is necessary to have a security system that has the ability to detect zero-day attacks and block them. “Honeypot is the proactive defense technology, in which resources placed in a network with the aim to observe and capture new attacks”. This paper proposes a honeypot-based model for intrusion detection system (IDS) to obtain the best useful data about the attacker. The ability and the limitations of Honeypots were tested and aspects of it that need to be improved were identified. In the future, we aim to use this trend for early prevention so that pre-emptive action is taken before any unexpected harm to our security system.

Keywords

Honeypot security forensic analysis of honeypots network

##plugins.themes.academic_pro.article.details##

How to Cite
Gulomov Sherzod Rajaboyevich, & Salimova Husniya Rustamovna. (2022). Honeypot-based intrusion detection system: A performance analysis. Texas Journal of Multidisciplinary Studies, 8, 227–230. Retrieved from https://zienjournals.com/index.php/tjm/article/view/1781

References

  1. Y. Yun, Y. Hongli and M. Jia, "Design of distributed honeypot system based on intrusion tracking", 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 196-198, 2011.
  2. J.C. Chang and T. Vi-Lang, "Design of virtual honeynet collaboration system in existing security research networks", 2010 International Symposium on Communications and Information Technologies (ISCIT), pp. 798-803, 2010.
  3. L. Li, H. Sun and Z. Zhang, The Research and Design of Honeypot System Applied in the LAN Security in Beijing, pp. 360-363, 2011.
  4. L. J. Zhang, "Honeypot-based defense system research and design", Computer Science and Information Technology 2009. ICCSIT 2009. 2nd IEEE International Conference on, pp. 466-470, 2009.
  5. T. Holz and F. Raynal, "Detecting honeypots and other suspicious environments", Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop 2005. IAW ‘05., pp. 29-36, 2005.
  6. T. Zhi-Hong, F. Bin-Xing and Y. Xiao-Chun, "An architecture for intrusion detection using honey pot", Machine Learning and Cybernetics 2003 International Conference on, vol. 2094, pp. 2096-2100, 2003.
  7. I.Kuwatly, M. Sraj, Z. Al Masri and H. Artail, "A dynamic honeypot design for intrusion detection", Pervasive Services 2004. ICPS 2004. IEEE/ACS International Conference on IEEE, pp. 95-104, 2004.
  8. A.Herrero, U. Zurutuza and E. Corchado, "A Neural-Visualization IDS for Honeynet Data", International Journal of Neural Systems, vol. 22, 2012.
  9. D. Puthal, S. Nepal, R. Ranjan and J. Chen, "A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream" in Web Information Systems Engineering-WISE, Springer International Publishing, pp. 93-108, 2015.
  10. Y. Mai, R. Upadrashta, X. Su and J. Honeypot, "A java-based network deception tool with monitoring and intrusion detection" in , Las Vegas, NV, pp. 804-808, 2004.
  11. D. Puthal, S. Nepal, R. Ranjan and J. Chen, "DPBSV-An Efficient and Secure Scheme for Big Sensing data Stream", Tustcom/BigDataSE/ISPA2015 IEEE, vol. 1, pp. 246-253.
  12. R. Talabis, "Honeypots 101: A Brief History of HoneyPots", The Philippine honeynet project, 2002.
  13. R. Baumann, "Honeyd-A low involvement Honeypot in Action", Original published as part of the GCIA practical, vol. 14, 2003.
  14. X. Li and D. Liu, "Automatic scheme to construct Snort rules from honeypots data", Journal of Systems Engineering and Electronics, vol. 16, pp. 466-470, 2005.
  15. H. Artail, H. Safa, M. Sraj, I. Kuwatly and Z. AI-Masri, "A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks", Computers and Security, vol. 25, pp. 274-288, 2006.
  16. D. Dagon, X. Qin, O. Gu, W. Lee, J. Grizzard, J. Levine, et al., Honey stat: Local worm detection using honeypots, pp. 39-58, 2004.