FTP Based Honeypot Implementation Model for Network Security

Abstract

In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder, by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. Our system uses the advantages of Honeypot for implementing an intrusion detection system. Honeyd is a powerful tool which can simulate even complex networks very easily. The system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base and some other rules to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. We have tested our data analyzer on many publicly available intrusion data. These data are in binary/pcap form. Accuracy of the system depends on the ruleset better the ruleset more will be the accuracy. We have used the ruleset of the snort and some other open source. If we include more such ruleset it will increase the accuracy of the system. The primary goal was to enhance the capability of the the honeypot. We have tested our tool on publicly available intrusion data which shows that only certain kind of attacks form the most of these attacks.

Authors and Affiliations

Diksha Dewangan, Amit Kumar Dewangan

Keywords

Related Articles

Energy Optimization in Ad-hoc Networks Using Ant Colony Optimization

MANET is known for its dynamic nature, heterogeneous devices and limited resources without any supportive infrastructure. Mobile devices in MANET have constrained resources like memory, energy, bandwidth etc. that must...

slugOptimized Name Entity Recognition of Machine Translation

Machine Translation is an important part of Natural Language Processing. Machine Translation refers to using machine to convert one natural language to another language. Machine transliteration for English to Punjabi an...

Simcard’s Address Book Access System

As the rapid growth in telecom companies and services provided by them mobile phone has become necessity for society as mobile phone are not just for calling but also aids other features like camera, clock, music player...

New Method for Solar Tracker Using Spiral Spring in Simulink

On an average the sunshine hour in India is about 6hrs annually also the sun shine shines in India for about 9 months in a year. Electricity from the sun can be generated through the solar photovoltaic modules (SPV). Th...

A Review Paper on Fingerprints for Privacy Protection

We propose here a novel system for privacy protection of fingerprint by merging two fingerprints & generate new identity. In the enrollment phase, two fingerprints are taken from two different fingers of one person. Fro...

Download PDF file
  • EP ID EP22322
  • DOI -
  • Views 247
  • Downloads 3

How To Cite

Diksha Dewangan, Amit Kumar Dewangan (2016). FTP Based Honeypot Implementation Model for Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(6), -. https://europub.co.uk/articles/-A-22322