FTP Based Honeypot Implementation Model for Network Security

Abstract

In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.

Authors and Affiliations

Diksha Dewangan, Amit Kumar Dewangan

Keywords

Related Articles

Influence of Parental Education Among their Wards on Vocational Skill Development

Many students are good in their studies even though their parents are illerrate.we cannot argue that only the educated parents can provide a good education for their children. Whereas the well-educated parents are more...

Wireless Electronic Notice Board Using Raspberry Pi 3

Notice boards can change the way communication with each other, using notice boards is a constructive method of promoting important information to a large number of people. Notice board is ideally useful tool for organi...

Palm Authentication:A Review

A system which is basically used for pattern detection and identification on the bases of physical and behavioral traits is known as biometric system. Biometric recognition has been investigated over the past many years...

Electrical Generation by using Vertical Axis Wind Turbine

Wind power capacity has experienced tremendous growth in the past decade. There are many loads (such as remote villages, islands, ships etc.) that are away from the main grid. Energy demand continues to grow, year after...

Proposed & Implemented Clustering Algorithm for Indexing in Search Engine

This paper proposes clustering algorithm for implementing indexing phase of search engine. The goal of making an index is to optimize speed and performance in finding relevant documents for a search query. Without an in...

Download PDF file
  • EP ID EP22322
  • DOI -
  • Views 263
  • Downloads 3

How To Cite

Diksha Dewangan, Amit Kumar Dewangan (2016). FTP Based Honeypot Implementation Model for Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(6), -. https://europub.co.uk/articles/-A-22322