Intrusion Detection System Using Raspberry Pi Honeypot in Network Security

Authors(1) :-

In the ever-changing world of global data communication, inexpensive Internet connection and fast-paced software development, security has become more and more of an issue in this world. Security is the basic requirement in today's world as any type of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data integrity are the basic security characteristics of computer security. A decoy based technology; Honeypot along with a Raspberry Pi makes network security simple,cost effective and easy for implementation. This paper is devoted to implementing the Raspberry Pi based Honeypot in a network that will attract attackers by simulating vulnerabilities and poor security too. Honeypot will record all the attackers’ activities and after data, analysis not only displays the type of attack done but also allow improvements in the security of the network.

Authors and Affiliations

M.Phil (Research scholar), KambanCollegeof Arts And Science For Women, Thiruvannmalai, Tamil Nadu, India

Communication, Security, Information, Honeypot, Raspberry Pi, Data Analysis, Data Security, Network

  1. LiberiosVokorokos, Peter Fanfara, JánRadusovský and Peter Poór,Sophisticated Honeypot Mechanism - the Autonomous Hybrid Solution for Enhancing Computer System Security, SAMI 2013 IEEE 11th International Symposium on Applied Machine Intelligence and Informatics, January 31 - February 2, 2013, Herl’any, Slovakia.
  2. R. Chandran, S. Pakala, Simulating Network with Honeyd, Technical Paper, Paladion Networks, December 2003.
  3. Article Title:
  5. Article Title:
  6. L. Spitzner, Honeypots: Tracking Hackers, Boston, USA: Addison- Weasley, Parson Education, ISBN 0-321-10895-7, 2003.
  7. L. Spitzner, The value of Honeypots, Part One: Definitions and value of Honeypots, Security Focus, 2001.
  8. S.Karthik, B.Samudrala, A.t.Yang,Design of Network Security Projects using Honeypots Journal of Computer Sciences in Colleges, 2004.
  9. http:/
  10. E. Dankova et al.,An Anomaly-Based Intrusion Detection System, Electrical Engineering and Informatics 2,Kosice,ISBN 978-80-553-0611-7,2011.

Publication Details

Published in : Volume 4 | Issue 3 | January-February 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 41-45
Manuscript Number : CSEIT184308
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

, "Intrusion Detection System Using Raspberry Pi Honeypot in Network Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.41-45, January-February-2018.
Journal URL :

Article Preview