skip to main content
10.1145/2978178.2978184acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention

Published:28 September 2016Publication History

ABSTRACT

A honeypot is a deception tool for enticing attackers to make efforts to compromise the electronic information systems of an organization. A honeypot can serve as an advanced security surveillance tool for use in minimizing the risks of attacks on information technology systems and networks. Honeypots are useful for providing valuable insights into potential system security loopholes. The current research investigated the effectiveness of the use of centralized system management technologies called Puppet and Virtual Machines in the implementation automated honeypots for intrusion detection, correction and prevention. A centralized logging system was used to collect information of the source address, country and timestamp of intrusions by attackers. The unique contributions of this research include: a demonstration how open source technologies is used to dynamically add or modify hacking incidences in a high-interaction honeynet system; a presentation of strategies for making honeypots more attractive for hackers to spend more time to provide hacking evidences; and an exhibition of algorithms for system and network intrusion prevention.

References

  1. Akkaya, D., and F. Thalgott. Honeypots in Network Security. pp. 1--39, 2010. Retrieved from http://www.diva-portal.org/smash/get/diva2:327476/fulltext01Google ScholarGoogle Scholar
  2. Anicas, M.. How To Install Elasticsearch, Logstash, and Kibana (ELK Stack) on Ubuntu 14.04., 2015. Retrieved from Digital Ocean: https://www.digitalocean.com/community/tutorials/how-to-install-elasticsearch-logstash-and-kibana-elk-stack-on-ubuntu-14-04Google ScholarGoogle Scholar
  3. Dittrich, D. Creating and managing distributed honeynets using honeywalls. Draft. University of Washington, 2004.Google ScholarGoogle Scholar
  4. Döring, C. Improving network security with Honeypots. University of Applied Sciences Darmstadt, 2005.Google ScholarGoogle Scholar
  5. Hoque, M. S., and M. A. Bikas. An Implementation of Intrusion Dectection System Using Genetic Algorithm. International Journal of Network Security & Its Applications (IJNSA), 2012.Google ScholarGoogle Scholar
  6. Jaiganesh, V., D. P. Sumathi, and A.Vinitha. Classification Algorithms in Intrusion Detection System: A Survey. Int.J.Computer Technology & Applications, 2013.Google ScholarGoogle Scholar
  7. Kaur, T., V. Malhotra, and D. D. Singh. (2014). Comparison of network security tools- Firewall, Intrusion Detection System and Honeypot, 202, 2014.Google ScholarGoogle Scholar
  8. Krawetz, N. Anti-Honeypot Technology. IEEE Security & Privacy, pp. 76--79, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Liston, T. Tom Liston talks about LaBrea, 2002. Retrieved from http://labrea.sourceforge.net/Intro-History.htmlGoogle ScholarGoogle Scholar
  10. Sahu, N., and V. Richhariya. Honeypot: A Survey. International Journal of Computer Science and Technology, 2012.Google ScholarGoogle Scholar
  11. Sobesto, B., M. Cukier, M. Hiltunen, D. Kormann, and G. Vesonder. DarkNOC: Dashboard for Honeypot Management. USENIX Association Berkeley, CA, USA 2011, pp. 16--16, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Spitzner, L. Tracking Hackers. Boston, MA.: Addison-Wesley, 2002.Google ScholarGoogle Scholar
  13. Spitzner, L. (2003). The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy (Volume:1, Issue: 2), 15--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Stiawan, D., A. H. Abdullah, and M. Y. Idris. Characterizing Network Intrusion Prevention System. International Journal of Computer Applications, pp. 975--8887, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  15. Stockman, M., R. Rein, and A. Heile. An Open-Source Honeynet System to Study System Banner Message Effects on Hackers. Journal of Computing Sciences in Colleges, pp. 282--293, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Virvilis, N., O. S. Serrano, and B. Vanautgaerden. Changing the game: The art of deceiving sophisticated attackers. NATO CCD COE Publications, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. Weiler, N. Honeypots for Distributed Denial of Service Attacks. IEEE Computer Society Washington, DC, USA, pp. 109--114, 2002 . Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wilson, T., D. Maimon , B. Sobesto, and M. Cukier. The Effect of a Surveillance Banner in an Attacked Computer System Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace. Journal of Research in Crime and Delinquency, 2015.Google ScholarGoogle Scholar

Index Terms

  1. In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      RIIT '16: Proceedings of the 5th Annual Conference on Research in Information Technology
      September 2016
      66 pages
      ISBN:9781450344531
      DOI:10.1145/2978178

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      RIIT '16 Paper Acceptance Rate9of20submissions,45%Overall Acceptance Rate51of116submissions,44%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader