ISSN Print: 2381-1137  ISSN Online: 2381-1145
International Journal of Wireless Communications, Networking and Mobile Computing  
Manuscript Information
 
 
A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network
International Journal of Wireless Communications, Networking and Mobile Computing
Vol.3 , No. 4, Publication Date: Sep. 9, 2016, Page: 43-47
1530 Views Since September 9, 2016, 635 Downloads Since Sep. 9, 2016
 
 
Authors
 
[1]    

Mehak Mengi, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India.

[2]    

Naveen Kumar Gondhi, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India.

 
Abstract
 

The most challenging task for organization in today’s world is to meet security needs. Various Intrusion detection and prevention techniques have been evolving for many years. This paper present a solution to combine signature based IDS along with honeypot. Our system has been developed in the LAN environment keeping in view the analysis of requirements of software engineering framework, design, implementation and testing. For IPS system, we deploy Signature based IDS (snort base) along with low interaction honeypot in order to detect and prevent known and unknown attacks. Moreover, By means of using different vulnerability scanners, our proposed model is able to make signature based IDS to learn the critical behavior of network attacks in more closer investigation which will in turn enhance the performance of our system with a less number of false positives and high detection rate.


Keywords
 

Snort, Honeypot, IPS, IDS, Heuristic


Reference
 
[01]    

James P. Anderson. Computer security threat monitoring and surveillance. Technical report, Fort Washington, 1980.

[02]    

Hyang-Ah Kim and Brad Karp. Autograph, toward automated, distributed worm signature detection.USENIX Security Symposium, pages 271–286, 2004.

[03]    

Snort – The defacto Standard for Intrusion Detection/Prevention, Available: http://www.snort.org, 14 February 2011.

[04]    

Lance Spitzner. Honey pots: Tracking Hackers. Addison-Wesley Professional, 2002.

[05]    

Zhichun Li, Lanjia Wang, Yan Chen and Zhi and “Network-based and attack-resilient length signature signature generation for zero-day polymorphicworms,” http://www.cs.northwestern.edu 6

[06]    

Christian Kreibich and Jon Crowcroft. Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer Communication Review, 34: 51–56, 2004.

[07]    

Sumeet Singh, Cristian Estan, George Varghese, andStefanSavage. Automatedworm fingerprinting. USENIX Security Symposium, pages 45–60, 2004.

[08]    

Y. Tang and S. Chen. Defending against internet worms: A signature-based approach.In Proceedings of the IEEE Infocom 2005, 2005.

[09]    

A. Sundaram. An introduction to intrusion detection. The ACM student magazine, 1996.

[10]    

Niels Provos. A virtual honeypot framework. In Proceedings of the 12th USENIXSecurity Symposium, pages 1–14, August 2004.

[11]    

Portokalidis, G; Bos,H.’Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploit’.Third International Conference on ACM SIGOPS/ EuroSys Europen Conference on Computer Systems, Newyork-US, pp. 287-299(2008).





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership