Analyse Honey Pot Traffics to Detect DoS Attacks Using Support Vector Machine

Authors(2) :-C. Naveena, R. Sasikala

Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. Denial of service (DoS) attack consumes the resources of a remote client or network itself, there by denying or degrading the service to the legitimate users. In this paper, we present a system that helps in the detection DoS attacks using the data mining framework. We have used support vector machine classifier to identify the honey pot traffic into normal and DoS attack.

Authors and Affiliations

C. Naveena
M.Phil Research Scholar, Department of Computer Science, Sankara College of Science and Commerce, Coimbatore, Tamil Nadu, India
R. Sasikala
Assistant Professor, Department of Computer Science, Sankara College of Science and Commerce, Coimbatore, Tamil Nadu, India

Honey pot, Dos, Data mining, SVM.

  1. Weiler, N. (2002). Honeypots for distributed enial-of-service attacks. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on (pp. 109-114). IEEE.
  2. Bhunia, S., Su, X., Sengupta, S., & Vazquez-Abad, F. (2014, January). Stochastic model for cognitive radio networks under jamming attacks and honeypot-based prevention. In International Conference on Distributed Computing and Networking (pp. 438-452). Springer, Berlin, Heidelberg.
  3. Deshpande, H. A. (2015). HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. arXiv preprint arXiv:1508.05002.
  4. Mirza, M., Usman, M., Biuk-Aghai, R. P., & Fong, S. (2016). A Modular Approach for Implementation of Honeypots in Cyber Security. International Journal of Applied Engineering Research, 11(8), 5446-5451.
  5. Djanali, S., Arunanto, F. X., Pratomo, B. A., Baihaqi, A., Studiawan, H., & Shiddiqi, A. M. (2014, November). Aggressive web application honeypot for exposing attacker's identity. In Information Technology, Computer and Electrical Engineering (ICITACEE), 2014 1st International Conference on (pp. 212-216). IEEE.
  6. Zemene, M. S., & Avadhani, P. S. (2015, August). Implementing high interaction honeypot to study SSH attacks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 1898-1903). IEEE.
  7. MACCDC - Pcaps from National CyberWatch Mid-Atlantic Collegiate Cyber Defense Competition https://www.netresec.com/?page=MACCDC
  8. Zhan, Z., Xu, M., & Xu, S. (2013). Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Transactions on Information Forensics and Security, 8(11), 1775-1789.
  9. Dongxia, L., & Yongbo, Z. (2012, March). An intrusion detection system based on honeypot technology. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 451-454). IEEE.
  10. Yang, Y., & Mi, J. (2010, April). Design and implementation of distributed intrusion detection system based on honeypot. In Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Vol. 6, pp. V6-260). IEEE.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 326-329
Manuscript Number : CSEIT1725133
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

C. Naveena, R. Sasikala, "Analyse Honey Pot Traffics to Detect DoS Attacks Using Support Vector Machine", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.326-329, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725133

Article Preview

Follow Us

Contact Us