...
首页> 外文期刊>International journal of simulation: systems, science and technology >AN INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY BASED ON AN ADVANCED HONEYPOTS SERVER
【24h】

AN INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY BASED ON AN ADVANCED HONEYPOTS SERVER

机译:基于高级蜜罐服务器的网络安全入侵检测系统

获取原文
           

摘要

The current greatest challenge to Network security is cyber warfare. Every part of computer network security is anessential component. In the existing technologies computer networks and systems are more crucially concerned with networksecurity. The greatest challenge in network is addressing security to the server side. This latest end-to-end research paperrecommends to improve the security performance to protect the network from intruders. An advanced honeypot based IntrusionDetection technique is used to detect and analyze threats to ensure security. The Honeypot technique adds a layer to the networksecurity to enhance its performance. A key feature of honeypot is to distract the attacker from the real system to derive importantinformation about hacker activities. To validate whether the clients are authorized or unauthorized and monitor the unauthorizedclient activities, as a first step we use IP validation together with vulnerability detection of user activities. In the second step we usevoice recognition as detectors of malicious attacks. Once IP validation and voice recognition are processed and matched then theclient is an authorized client and the packet is transmitted to the server, but if not matched it is an unauthorized client, then thepacket transmits it to the honeypot server. Our experiment has demonstrated that this particular approach can successfullyidentify unknown attacks with greater than 95% detection rate and less than 1% false alarm rate.
机译:目前对网络安全的最大挑战是网络战。计算机网络安全的每个部分都是anessential组件。在现有技术中,计算机网络和系统更为关切网络安全。网络中最大的挑战是解决服务器端的安全性。这种最新的端到端的研究论文,以改善安全性能,以保护网络免受入侵者的影响。基于先进的蜜罐的IntusionDetection技术用于检测和分析威胁以确保安全性。蜜罐技术为网络安全添加了一层,以提高其性能。蜜罐的一个关键特征是分散真实系统的攻击者的注意力,以获得关于黑客活动的重要信息。要验证客户端是否被授权或未授权并监视未经授权的活动,作为我们使用IP验证以及用户活动的漏洞检测的第一步。在第二步中,我们将识别识别为恶意攻击的探测器。一旦被处理和匹配的IP验证和语音识别,那么TheClient是一个授权的客户端,数据包被传输到服务器,但如果不匹配它是未授权的客户端,则该客户端将其传输到Honeypot服务器。我们的实验表明,这种特殊方法可以成功地用大于95%的检测率和小于1%的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号