Analyse Honey Pot Traffics to Detect DoS Attacks Using Support Vector Machine

Authors

  • C. Naveena  M.Phil Research Scholar, Department of Computer Science, Sankara College of Science and Commerce, Coimbatore, Tamil Nadu, India
  • R. Sasikala  Assistant Professor, Department of Computer Science, Sankara College of Science and Commerce, Coimbatore, Tamil Nadu, India

Keywords:

Honey pot, Dos, Data mining, SVM.

Abstract

Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. Denial of service (DoS) attack consumes the resources of a remote client or network itself, there by denying or degrading the service to the legitimate users. In this paper, we present a system that helps in the detection DoS attacks using the data mining framework. We have used support vector machine classifier to identify the honey pot traffic into normal and DoS attack.

References

  1. Weiler, N. (2002). Honeypots for distributed enial-of-service attacks. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on (pp. 109-114). IEEE.
  2. Bhunia, S., Su, X., Sengupta, S., & Vazquez-Abad, F. (2014, January). Stochastic model for cognitive radio networks under jamming attacks and honeypot-based prevention. In International Conference on Distributed Computing and Networking (pp. 438-452). Springer, Berlin, Heidelberg.
  3. Deshpande, H. A. (2015). HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. arXiv preprint arXiv:1508.05002.
  4. Mirza, M., Usman, M., Biuk-Aghai, R. P., & Fong, S. (2016). A Modular Approach for Implementation of Honeypots in Cyber Security. International Journal of Applied Engineering Research, 11(8), 5446-5451.
  5. Djanali, S., Arunanto, F. X., Pratomo, B. A., Baihaqi, A., Studiawan, H., & Shiddiqi, A. M. (2014, November). Aggressive web application honeypot for exposing attacker's identity. In Information Technology, Computer and Electrical Engineering (ICITACEE), 2014 1st International Conference on (pp. 212-216). IEEE.
  6. Zemene, M. S., & Avadhani, P. S. (2015, August). Implementing high interaction honeypot to study SSH attacks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 1898-1903). IEEE.
  7. MACCDC - Pcaps from National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition https://www.netresec.com/?page=MACCDC
  8. Zhan, Z., Xu, M., & Xu, S. (2013). Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Transactions on Information Forensics and Security, 8(11), 1775-1789.
  9. Dongxia, L., & Yongbo, Z. (2012, March). An intrusion detection system based on honeypot technology. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 451-454). IEEE.
  10. Yang, Y., & Mi, J. (2010, April). Design and implementation of distributed intrusion detection system based on honeypot. In Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Vol. 6, pp. V6-260). IEEE.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
C. Naveena, R. Sasikala, " Analyse Honey Pot Traffics to Detect DoS Attacks Using Support Vector Machine, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.326-329, November-December-2017.