Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques
Citation
Aaditya Jain, Dr. Bala Buksh"Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques", International Journal of Engineering Trends and Technology (IJETT), V29(6),304-312 November 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Achieving network system security is one
of the most popular and fastest Information
Technologies in organizations. Tools for network
security deal with the capture, recording and analysis
of network events in order to discover evidential
information about the source of security attacks.
Advanced decoy based technology called Honeypot
has a huge potential for the security community and
can achieve several goals of other security
technologies. This paper discusses about the honeypot
technology with its classification based on various
factors. Paper also throws light on some new types of
honeypots with recently proposed models based on it.
At last this paper provides comparative study with
other network security tools.
References
[1] Snehil Vidwarshi, Atul Tyagi, Rishi Kumar, “A
Discussion about Honeypots and Different Models
Based on Honeypot”, 28th IRF International Conference,
ISBN: 978-93-85465-37-6, June 2015.
[2] L. Spitzner, “Honeypot: Catching the Insider Threat”,
19th Annual Computer Security Applications Conference,
2003.
[3] Niharika and Ranjeet Kaur, “Honeypot for Network
Surveillance”, International Journal of Research in
Engineering & Technology, ISSN (E): 2321-8843, ISSN
(P): 2347-4599 Vol. 2, Issue 5, May 2014.
[4] http://www.honeynet.org.
[5] Navneet Kambow and Lavleen Kaur Passi, “Honeypots:
The Need of Network Security”, International Journal of
Computer Science and Information Technologies, ISSN:
0975-9646, Vol. 5, 2014.
[6] Snehal B Rase and Pranjali Deshmukh, “Summarization
of Honeypot: A Evolutionary Technology for Securing
Data over Network” International Journal of Science and
Research, ISSN: 2319-7064, 2013.
[7] Xuxian Jiang, Dongyan Xu, Yi-Min Wang, “A VM
Based Honeyfarm and Reverse Honeyfarm architecture
for Network Attack Capture and Detection”, 2006.
[8] Georgios Portokalidis, Asia Slowinska, and Herbert Bos,
“Argos: an Emulator for Fingerprinting Zero-Day
Attacks”, ACM SIGOPS Operating Systems Review,
Vol. 40, No. 4, pp. 15-27, October 2006.
[9] Yaser Alosefer and Omer Rana, “Honeyware - Webbased
Low Interaction Client Honeypot”, Proceedings of
the International Conference on Software Testing,
Verification, and Validation Workshops, pp. 410-417,
April 2010.
[10] Yu Adachi and Yoshihiro Oyama, “Malware Analysis
System using Process-Level Virtualization”, Proceedings
of IEEE Symposium on Computers and Communications,
pp. 550-556, July 2009.
[11] Jianwei Zhuge, Thorsten Holz, Xinhui Han, and Wei
Zou, “Collecting Autonomous Spreading Malware using
High-Interaction Honeypots,” Proceedings of the
International Conference on Information and
Communications Security, pp. 438-451, December 2007.
[12] K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K.
Xinidis, E. Markatos, and A. D. Keromytis “Detecting
Targeted Attacks Using Shadow Honeypots”,
Proceedings of the Conference on USENIX Security
Symposium, pp. 9-23, August 2005.
[13] http://labrea.sourceforge.net/labrea-info.html.
[14] Vinu V. Das, “Honeypot Scheme for Distributed Denialof-
Service”, Proceedings of the International Conference
on Advanced Computer Control, pp. 497-501, January
2009.
[15] Niels Provos, “A virtual honeypot framework”, in
Proceedings of the 13th conference on USENIX Security
Symposium, Vol. 13, SSYM`04, Berkeley, CA, USA,
2004.
[16] Jose Nazario, “PhoneyC: A Virtual Client Honeypot”,
Proceedings of USENIX Workshop on Large-Scale and
Emergent Threats, pp. 1-8, April 2009.
[17] Neil C. Rowe, E. John Custy, Binh T. Duong,
“Defending Cyberspace with Fake Honeypots”, Journal
of Computers, Vol. 2, No. 2, pp. 25-36, April 2007.
[18] http://www.honeynet.org.pt/index.php/HoneyMole.
[19] Swapnali Sunder Sadamate, “Review Paper on Honeypot
Mechanism-the Autonomous Hybrid Solution for
Enhancing”, Internationlal Journal of Advanced
Research in Computer Science and Software
Engineering, ISSN: 227712X, Vol. 4, Issue 1, January
2014.
[20] Sounak Paul and Bimal Kumar Mishra, “Honeypot
Based Signature for Defence Against Polymorphic
Worm Attack in Networks”, IEEE International Advance
Computing Conference (IACC), 2013.
[21] Bimal Kumar Mishra and Dinesh Kumar Saini, “SEIRS
epidemics model with delay for transmission of
malicious objects in computer network”, Applied
Mathematics and Computation, Elsevier, 188, 2007.
[22] Shaik Bhanu, Girish Khilari, Varun Kumar, “Analysis of
SSH Attacks of Darknet Using Honeypots”,
International Journal of Engineering Development and
Research, ISSN: 2321-9939, Vol. 3, Issue 1, 2014.
[23] Bacher, P., Holz, T., Kotter, M. and Wicherski, G.,
“Know your enemy: Tracking botnets”, 2008, available
at http://www.honeynet.org/papers/bots/.
[24] Rajab Challoo, Raghavendra Kotapalli, “Detection of
Botnets Using Honeypots and P2P Botnets”,
International Journal of Computer Science and Security
(IJCSS), Vol. 5, Issue 5, 2011.
[25] S. Ioannidis et al., “Implementing a Distributed
Firewall”, in proceedings of the ACM Computer and
Communication Security (CCS), PP. 190-199, 2000.
[26] Tejvir Kaur, Vimmi Malhotra, Dr. Dheerendra Singh,
“Comparision of Network Security Tools Firewall,
Intrusion Detection System & Honeypot”, International
Journal of Enhanced Research in Science, Technology &
Engineering, ISSN: 2319-7463, Vol. 3, Issue 2, February
2014.
[27] Ram Kumar Singh & Prof. T. Ramanujam, “Intrusion
Detection System Using advanced Honeypots”,
International Journal of Computer Science and
Information Security, Vol 2, No. 1, 2009.
Keywords
Honeypots, Ssh, Botnet, Polymorphic
worm, Ids, and Firewall.