UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 3
March-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1903565


Registration ID:
199226

Page Number

474-479

Share This Article


Jetir RMS

Title

Heuristics Based Network Anomaly Detection Using Honeypot

Abstract

A modern day Network attack is typically defined as a methodology or a process used to compromise network security. These attacks could either be passive meaning the information is being monitored and is being snooped upon or active meaning the information is being stolen, altered, destroyed or corrupted depending on attacker’s intent. Cybercriminals are becoming increasingly persistent and sophisticated in their activities. The traditional approaches employed by the organizations of using security solutions like firewall, IPS/IDS, email security etc. are reactive in nature and depend on the existing signatures and pattern of know attack vectors. These solutions are incapable of finding out unknown threats and zero day attacks. The solution of deploying honeypots as a pre-emptive measure to cyber incidents has proven effective in countering such attacks. Honeypots can be helpful in prevention of operational network from network based attacks such as DDoS by heuristics based traffic anomaly detection with high probability by luring attackers. A honeypot is an active decoy and deception defence system for Network Security. It records and captures various intrinsic details and modus operandi of the attacker, tracks the tools and techniques used, and acts like an early warning system for the security teams. To prevent, detect and react to malicious intrusion [1] attempts without disturbing the existing system is the most critical challenge for Network Security teams. The problem of detecting unknown attacks can be solved to an extent by traffic anomaly detection. In this paper, it is proposed to configure a honeypot on a dummy machine and deploy it at the perimeter of organization’s network. This honeypot can be configured for a virtual environment and analysis of collected threat intelligence. Any network malware or an intruder on a network will typically try to scan to find the open ports and services running. Here goal is to keep selected ports open and run services that are directed to access honeypot and not towards the internal network. The logs and network traffic generated can then be studied and examined for heuristics based anomaly detection of any possible cyber incident for futuristic purposes. The logging capability of honeypot helps in examining traffic patterns, behavioural analysis, finger prints of various attack vectors and hash values.

Key Words

Cite This Article

"Heuristics Based Network Anomaly Detection Using Honeypot", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 3, page no.474-479, March-2019, Available :http://www.jetir.org/papers/JETIR1903565.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Heuristics Based Network Anomaly Detection Using Honeypot", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 3, page no. pp474-479, March-2019, Available at : http://www.jetir.org/papers/JETIR1903565.pdf

Publication Details

Published Paper ID: JETIR1903565
Registration ID: 199226
Published In: Volume 6 | Issue 3 | Year March-2019
DOI (Digital Object Identifier):
Page No: 474-479
Country: GREATER NOIDA, GAUTAM BUDH NAGAR, UTTAR PRADESH, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003008

Print This Page

Current Call For Paper

Jetir RMS