Visible to the public Dynamic Honeypot Configuration for Intrusion Detection

TitleDynamic Honeypot Configuration for Intrusion Detection
Publication TypeConference Paper
Year of Publication2018
AuthorsSekar, K. R., Gayathri, V., Anisha, G., Ravichandran, K. S., Manikandan, R.
Conference Name2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)
ISBN Number978-1-5386-3570-4
KeywordsComputer crime, Computer hacking, computer network security, Conferences, Dynamic Configuration, Dynamic configuration and Intruders, dynamic Honeypot Configuration, enterprise level security, Honey Pot, honey pots, honey trap methodology, honeypot, honeypot mechanism activity, Honeypot security system, Honeytrap, Human Behavior, human factors, Informatics, Internet, intruders, intrusion detection system, Intrusion Prevention system factors, IP networks, Market research, network activity, pubcrawl, resilience, Resiliency, Scalability, secured network, Software, unauthorized users, unsecured network, unused IP address

The objective of the Honeypot security system is a mechanism to identify the unauthorized users and intruders in the network. The enterprise level security can be possible via high scalability. The whole theme behind this research is an Intrusion Detection System and Intrusion Prevention system factors accomplished through honeypot and honey trap methodology. Dynamic Configuration of honey pot is the milestone for this mechanism. Eight different methodologies were deployed to catch the Intruders who utilizing the unsecured network through the unused IP address. The method adapted here to identify and trap through honeypot mechanism activity. The result obtained is, intruders find difficulty in gaining information from the network, which helps a lot of the industries. Honeypot can utilize the real OS and partially through high interaction and low interaction respectively. The research work concludes the network activity and traffic can also be tracked through honeypot. This provides added security to the secured network. Detection, prevention and response are the categories available, and moreover, it detects and confuses the hackers.

Citation Keysekar_dynamic_2018