Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-29 Number-6
Year of Publication : 2015
Authors : Aaditya Jain, Dr. Bala Buksh
DOI :  10.14445/22315381/IJETT-V29P257

Citation 

Aaditya Jain, Dr. Bala Buksh"Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques", International Journal of Engineering Trends and Technology (IJETT), V29(6),304-312 November 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Achieving network system security is one of the most popular and fastest Information Technologies in organizations. Tools for network security deal with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks. Advanced decoy based technology called Honeypot has a huge potential for the security community and can achieve several goals of other security technologies. This paper discusses about the honeypot technology with its classification based on various factors. Paper also throws light on some new types of honeypots with recently proposed models based on it. At last this paper provides comparative study with other network security tools.

 References

[1] Snehil Vidwarshi, Atul Tyagi, Rishi Kumar, “A Discussion about Honeypots and Different Models Based on Honeypot”, 28th IRF International Conference, ISBN: 978-93-85465-37-6, June 2015.
[2] L. Spitzner, “Honeypot: Catching the Insider Threat”, 19th Annual Computer Security Applications Conference, 2003.
[3] Niharika and Ranjeet Kaur, “Honeypot for Network Surveillance”, International Journal of Research in Engineering & Technology, ISSN (E): 2321-8843, ISSN (P): 2347-4599 Vol. 2, Issue 5, May 2014.
[4] http://www.honeynet.org.
[5] Navneet Kambow and Lavleen Kaur Passi, “Honeypots: The Need of Network Security”, International Journal of Computer Science and Information Technologies, ISSN: 0975-9646, Vol. 5, 2014.
[6] Snehal B Rase and Pranjali Deshmukh, “Summarization of Honeypot: A Evolutionary Technology for Securing Data over Network” International Journal of Science and Research, ISSN: 2319-7064, 2013.
[7] Xuxian Jiang, Dongyan Xu, Yi-Min Wang, “A VM Based Honeyfarm and Reverse Honeyfarm architecture for Network Attack Capture and Detection”, 2006.
[8] Georgios Portokalidis, Asia Slowinska, and Herbert Bos, “Argos: an Emulator for Fingerprinting Zero-Day Attacks”, ACM SIGOPS Operating Systems Review, Vol. 40, No. 4, pp. 15-27, October 2006.
[9] Yaser Alosefer and Omer Rana, “Honeyware - Webbased Low Interaction Client Honeypot”, Proceedings of the International Conference on Software Testing, Verification, and Validation Workshops, pp. 410-417, April 2010.
[10] Yu Adachi and Yoshihiro Oyama, “Malware Analysis System using Process-Level Virtualization”, Proceedings of IEEE Symposium on Computers and Communications, pp. 550-556, July 2009.
[11] Jianwei Zhuge, Thorsten Holz, Xinhui Han, and Wei Zou, “Collecting Autonomous Spreading Malware using High-Interaction Honeypots,” Proceedings of the International Conference on Information and Communications Security, pp. 438-451, December 2007.
[12] K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis “Detecting Targeted Attacks Using Shadow Honeypots”, Proceedings of the Conference on USENIX Security Symposium, pp. 9-23, August 2005.
[13] http://labrea.sourceforge.net/labrea-info.html.
[14] Vinu V. Das, “Honeypot Scheme for Distributed Denialof- Service”, Proceedings of the International Conference on Advanced Computer Control, pp. 497-501, January 2009.
[15] Niels Provos, “A virtual honeypot framework”, in Proceedings of the 13th conference on USENIX Security Symposium, Vol. 13, SSYM`04, Berkeley, CA, USA, 2004.
[16] Jose Nazario, “PhoneyC: A Virtual Client Honeypot”, Proceedings of USENIX Workshop on Large-Scale and Emergent Threats, pp. 1-8, April 2009.
[17] Neil C. Rowe, E. John Custy, Binh T. Duong, “Defending Cyberspace with Fake Honeypots”, Journal of Computers, Vol. 2, No. 2, pp. 25-36, April 2007.
[18] http://www.honeynet.org.pt/index.php/HoneyMole.
[19] Swapnali Sunder Sadamate, “Review Paper on Honeypot Mechanism-the Autonomous Hybrid Solution for Enhancing”, Internationlal Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 227712X, Vol. 4, Issue 1, January 2014.
[20] Sounak Paul and Bimal Kumar Mishra, “Honeypot Based Signature for Defence Against Polymorphic Worm Attack in Networks”, IEEE International Advance Computing Conference (IACC), 2013.
[21] Bimal Kumar Mishra and Dinesh Kumar Saini, “SEIRS epidemics model with delay for transmission of malicious objects in computer network”, Applied Mathematics and Computation, Elsevier, 188, 2007.
[22] Shaik Bhanu, Girish Khilari, Varun Kumar, “Analysis of SSH Attacks of Darknet Using Honeypots”, International Journal of Engineering Development and Research, ISSN: 2321-9939, Vol. 3, Issue 1, 2014.
[23] Bacher, P., Holz, T., Kotter, M. and Wicherski, G., “Know your enemy: Tracking botnets”, 2008, available at http://www.honeynet.org/papers/bots/.
[24] Rajab Challoo, Raghavendra Kotapalli, “Detection of Botnets Using Honeypots and P2P Botnets”, International Journal of Computer Science and Security (IJCSS), Vol. 5, Issue 5, 2011.
[25] S. Ioannidis et al., “Implementing a Distributed Firewall”, in proceedings of the ACM Computer and Communication Security (CCS), PP. 190-199, 2000.
[26] Tejvir Kaur, Vimmi Malhotra, Dr. Dheerendra Singh, “Comparision of Network Security Tools Firewall, Intrusion Detection System & Honeypot”, International Journal of Enhanced Research in Science, Technology & Engineering, ISSN: 2319-7463, Vol. 3, Issue 2, February 2014.
[27] Ram Kumar Singh & Prof. T. Ramanujam, “Intrusion Detection System Using advanced Honeypots”, International Journal of Computer Science and Information Security, Vol 2, No. 1, 2009.

Keywords
Honeypots, Ssh, Botnet, Polymorphic worm, Ids, and Firewall.