Visible to the public Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot

TitleImproving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Publication TypeConference Paper
Year of Publication2020
AuthorsPashaei, A., Akbari, M. E., Lighvan, M. Z., Teymorzade, H. Ali
Conference Name2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I CPS Europe)
Date Publishedjun
Keywordscomputer network performance evaluation, computer network security, control engineering computing, cybersecurity networks, Early Detection approach, Early Intrusion Detection System, honeypots, ICS Honeypot, ICS SCADA, IDS performance, IDS Snort, industrial control, industrial control facility networks, industrial control system, industrial control systems, industrial EIDS, Industrial honeypot, industrial installations, industrial network security heads, industrial network systems, industrialized Early Intrusion Detection System, integrated circuits, intelligent manufacturing systems, internal industrial network, Intrusion detection, Iptables, Iptables MikroTik, Local area networks, Monitoring, Network security, Predictive Metrics, production engineering computing, Protocols, pubcrawl, resilience, Resiliency, Router Systems Security, routers, Scalability, Servers

The security of Industrial Control system (ICS) of cybersecurity networks ensures that control equipment fails and that regular procedures are available at its control facilities and internal industrial network. For this reason, it is essential to improve the security of industrial control facility networks continuously. Since network security is threatening, industrial installations are irreparable and perhaps environmentally hazardous. In this study, the industrialized Early Intrusion Detection System (EIDS) was used to modify the Intrusion Detection System (IDS) method. The industrial EIDS was implemented using routers, IDS Snort, Industrial honeypot, and Iptables MikroTik. EIDS successfully simulated and implemented instructions written in IDS, Iptables router, and Honeypots. Accordingly, the attacker's information was displayed on the monitoring page, which had been designed for the ICS. The EIDS provides cybersecurity and industrial network systems against vulnerabilities and alerts industrial network security heads in the shortest possible time.

Citation Keypashaei_improving_2020