Intrusion Detection System Using Raspberry Pi Honeypot in Network Security
Keywords:
Communication, Security, Information, Honeypot, Raspberry Pi, Data Analysis, Data Security, NetworkAbstract
In the ever-changing world of global data communication, inexpensive Internet connection and fast-paced software development, security has become more and more of an issue in this world. Security is the basic requirement in today's world as any type of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data integrity are the basic security characteristics of computer security. A decoy based technology; Honeypot along with a Raspberry Pi makes network security simple,cost effective and easy for implementation. This paper is devoted to implementing the Raspberry Pi based Honeypot in a network that will attract attackers by simulating vulnerabilities and poor security too. Honeypot will record all the attackers’ activities and after data, analysis not only displays the type of attack done but also allow improvements in the security of the network.
References
- LiberiosVokorokos, Peter Fanfara, JánRadusovský and Peter Poór,Sophisticated Honeypot Mechanism - the Autonomous Hybrid Solution for Enhancing Computer System Security, SAMI 2013 IEEE 11th International Symposium on Applied Machine Intelligence and Informatics, January 31 - February 2, 2013, Herl’any, Slovakia.
- R. Chandran, S. Pakala, Simulating Network with Honeyd, Technical Paper, Paladion Networks, December 2003.
- Article Title: http://www.snort.org
- https://www.zeltser.com/mpdernhoneynetworkexperiments/
- Article Title: http://bob.k6rtm.net/kippo.html
- L. Spitzner, Honeypots: Tracking Hackers, Boston, USA: Addison- Weasley, Parson Education, ISBN 0-321-10895-7, 2003.
- L. Spitzner, The value of Honeypots, Part One: Definitions and value of Honeypots, Security Focus, 2001.
- S.Karthik, B.Samudrala, A.t.Yang,Design of Network Security Projects using Honeypots Journal of Computer Sciences in Colleges, 2004.
- http:/www.raspberrypi.org/help/what-is-a-raspberry-pi/.
- E. Dankova et al.,An Anomaly-Based Intrusion Detection System, Electrical Engineering and Informatics 2,Kosice,ISBN 978-80-553-0611-7,2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.