Intrusion Detection System Using Raspberry Pi Honeypot in Network Security

Authors

  •   M.Phil (Research scholar), KambanCollegeof Arts And Science For Women, Thiruvannmalai, Tamil Nadu, India

Keywords:

Communication, Security, Information, Honeypot, Raspberry Pi, Data Analysis, Data Security, Network

Abstract

In the ever-changing world of global data communication, inexpensive Internet connection and fast-paced software development, security has become more and more of an issue in this world. Security is the basic requirement in today's world as any type of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data integrity are the basic security characteristics of computer security. A decoy based technology; Honeypot along with a Raspberry Pi makes network security simple,cost effective and easy for implementation. This paper is devoted to implementing the Raspberry Pi based Honeypot in a network that will attract attackers by simulating vulnerabilities and poor security too. Honeypot will record all the attackers’ activities and after data, analysis not only displays the type of attack done but also allow improvements in the security of the network.

References

  1. LiberiosVokorokos, Peter Fanfara, JánRadusovský and Peter Poór,Sophisticated Honeypot Mechanism - the Autonomous Hybrid Solution for Enhancing Computer System Security, SAMI 2013 IEEE 11th International Symposium on Applied Machine Intelligence and Informatics, January 31 - February 2, 2013, Herl’any, Slovakia.
  2. R. Chandran, S. Pakala, Simulating Network with Honeyd, Technical Paper, Paladion Networks, December 2003.
  3. Article Title: http://www.snort.org
  4. https://www.zeltser.com/mpdernhoneynetworkexperiments/
  5. Article Title: http://bob.k6rtm.net/kippo.html
  6. L. Spitzner, Honeypots: Tracking Hackers, Boston, USA: Addison- Weasley, Parson Education, ISBN 0-321-10895-7, 2003.
  7. L. Spitzner, The value of Honeypots, Part One: Definitions and value of Honeypots, Security Focus, 2001.
  8. S.Karthik, B.Samudrala, A.t.Yang,Design of Network Security Projects using Honeypots Journal of Computer Sciences in Colleges, 2004.
  9. http:/www.raspberrypi.org/help/what-is-a-raspberry-pi/.
  10. E. Dankova et al.,An Anomaly-Based Intrusion Detection System, Electrical Engineering and Informatics 2,Kosice,ISBN 978-80-553-0611-7,2011.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
, " Intrusion Detection System Using Raspberry Pi Honeypot in Network Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.41-45, January-February-2018.