Visible to the public Performance Analysis of IDS with Honey Pot on New Media Broadcasting

TitlePerformance Analysis of IDS with Honey Pot on New Media Broadcasting
Publication TypeConference Paper
Year of Publication2017
AuthorsPomsathit, A.
Conference Name2017 International Conference on Circuits, Devices and Systems (ICCDS)
KeywordsBroadcasting, computer network security, denial of service, digital multimedia broadcasting, DoS, firewalls, Floods, Honey Pot, honey pots, human factors, ICMP Flood, IDS, Intrusion Detection Systems, IPTV, IPTV system, LAN network, Linux, Linux open source operating system, network intrusion detection system, new media broadcasting, operating systems (computers), pubcrawl, public domain software, resilience, Resiliency, Scalability, security tools, Servers, Snort, TCP Flood, transport protocols, UDP flood, WiFi, Wireless fidelity
AbstractThis research was an experimental analysis of the Intrusion Detection Systems(IDS) with Honey Pot conducting through a study of using Honey Pot in tricking, delaying or deviating the intruder to attack new media broadcasting server for IPTV system. Denial of Service(DoS) over wire network and wireless network consisted of three types of attacks: TCP Flood, UDP Flood and ICMP Flood by Honey Pot, where the Honeyd would be used. In this simulation, a computer or a server in the network map needed to be secured by the inactivity firewalls or other security tools for the intrusion of the detection systems and Honey Pot. The network intrusion detection system used in this experiment was SNORT ( developed in the form of the Open Source operating system-Linux. The results showed that, from every experiment, the internal attacks had shown more threat than the external attacks. In addition, attacks occurred through LAN network posted 50% more disturb than attacks occurred on WIFI. Also, the external attacks through LAN posted 95% more attacks than through WIFI. However, the number of attacks presented by TCP, UDP and ICMP were insignificant. This result has supported the assumption that Honey Pot was able to help detecting the intrusion. In average, 16% of the attacks was detected by Honey Pot in every experiment.
Citation Keypomsathit_performance_2017