Hybrid honey pot system for malware analysis using python

Authors

  • Ritesh Kawale Computer Engineering Student Saint Vincent Pallotti College Of Engineering and Technology Nagpur, India
  • Aditya Dhumal Computer Engineering Student Saint Vincent Pallotti College Of Engineering and Technology Nagpur, India
  • Aditya Nipane Computer Engineering Student Saint Vincent Pallotti College Of Engineering and Technology Nagpur, India
  • Tanvi Mankar Computer Engineering Student Saint Vincent Pallotti College Of Engineering and Technology Nagpur, India

Keywords:

Performance, Hybrid Intrusion Detection System, Signature and Anomaly-based detection, Honeypot Networks

Abstract

The latest wireless technology is growing smartphone technology and emerging mobile cloud technology. Mobile cloud computing has a lot of advantages in the future, but it's also very easy for hackers to take full control of the privacy of many other users' data. While data security is expected to be secure, the main disadvantage for users is that when the computer is connected to the internet, an intruder can easily steal data from the required target. As a result, a combination of Hybrid Intrusion Detection System (HyInt) and Honeypot networks have been implemented into the Mobile Cloud Environment to provide better security by mitigating unidentified and known attacks. The research work's execution provides a pure perspective of the algorithm's security and quality products that were not included in the previous research work. Intensive statistical analysis was carried out as part of the research to demonstrate the consistency of the proposed algorithm. The implementation and evaluation results show that there is plenty of room for more research on the cloud-based Intrusion Detection System. The implemented algorithm can be used to effectively monitor the network's activities in a high-security cloud environment developed for army and banking purposes.

References

Camilo, Viecco. “Improving Honeynet Data Analysis,” Information Assurance and Security Workshop, pp. 99-106, 2007.

D. Moore, “Network telescopes: Observing small or distant security events,” Proceedings of the 11th USENIX security symposium, 2002.

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network telescopes: Technical report," CAIDA, April 2004.

Dacier M, Pouget F, Debar H. Honeypots: practical means to validate malicious fault assumptions. In: Proceedings of 10th pacific rim international symposium on dependable computing, pp. 383–8, March 2004.

Eugene Spafford. An analysis of the Internet worm. In Proceedings of European Software Engineering Conference, September 1989.

Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward understanding distributed blackhole placement. In Proceedings of the Second ACM Workshop on Rapid malcode (WORM), October 2004.

http://www.pandasecurity.com.

http://www.sans.com.

J. Dike, “User-mode Linux,” Proceedings of the 5th annual conference on Linux Showcase & Conference-Volume 5, USENIX Association Berkeley, CA, USA, pp. 2-2, 2001.

Khattab M, Sangpachatanaruk C, Mosse D, MelhemR, Znati T. Roaming honeypots for mitigating service-level denial-of-service attacks. In: Proceedings of the IEEE 24th international conference on distributed computing systemsMarch, p. 328–37, 2004.

Downloads

Published

18-04-2022

How to Cite

Ritesh Kawale, Aditya Dhumal, Aditya Nipane, & Tanvi Mankar. (2022). Hybrid honey pot system for malware analysis using python. International Journal for Research Publication and Seminar, 13(3), 112–127. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/543

Issue

Section

Original Research Article