Hybrid honey pot system for malware analysis using python
Keywords:
Performance, Hybrid Intrusion Detection System, Signature and Anomaly-based detection, Honeypot NetworksAbstract
The latest wireless technology is growing smartphone technology and emerging mobile cloud technology. Mobile cloud computing has a lot of advantages in the future, but it's also very easy for hackers to take full control of the privacy of many other users' data. While data security is expected to be secure, the main disadvantage for users is that when the computer is connected to the internet, an intruder can easily steal data from the required target. As a result, a combination of Hybrid Intrusion Detection System (HyInt) and Honeypot networks have been implemented into the Mobile Cloud Environment to provide better security by mitigating unidentified and known attacks. The research work's execution provides a pure perspective of the algorithm's security and quality products that were not included in the previous research work. Intensive statistical analysis was carried out as part of the research to demonstrate the consistency of the proposed algorithm. The implementation and evaluation results show that there is plenty of room for more research on the cloud-based Intrusion Detection System. The implemented algorithm can be used to effectively monitor the network's activities in a high-security cloud environment developed for army and banking purposes.
References
Camilo, Viecco. “Improving Honeynet Data Analysis,” Information Assurance and Security Workshop, pp. 99-106, 2007.
D. Moore, “Network telescopes: Observing small or distant security events,” Proceedings of the 11th USENIX security symposium, 2002.
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network telescopes: Technical report," CAIDA, April 2004.
Dacier M, Pouget F, Debar H. Honeypots: practical means to validate malicious fault assumptions. In: Proceedings of 10th pacific rim international symposium on dependable computing, pp. 383–8, March 2004.
Eugene Spafford. An analysis of the Internet worm. In Proceedings of European Software Engineering Conference, September 1989.
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward understanding distributed blackhole placement. In Proceedings of the Second ACM Workshop on Rapid malcode (WORM), October 2004.
J. Dike, “User-mode Linux,” Proceedings of the 5th annual conference on Linux Showcase & Conference-Volume 5, USENIX Association Berkeley, CA, USA, pp. 2-2, 2001.
Khattab M, Sangpachatanaruk C, Mosse D, MelhemR, Znati T. Roaming honeypots for mitigating service-level denial-of-service attacks. In: Proceedings of the IEEE 24th international conference on distributed computing systemsMarch, p. 328–37, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.