Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 44))

Abstract

The rapid growth of internet and internet based applications has given rise to the number of attacks on the network. The way the attacker attacks the system differs from one attacker to the other. The sequence of attack or the signature of an attacker should be stored, analyzed and used to generate rules for mitigating future attack attempts. In this paper, we have deployed honeypot to record the activities of the attacker. While the attacker prepares for an attack, the IDS redirects him to the honeypot. We make the attacker to believe that he is working with the actual system. The activities related to the attack are recorded by the honeypot by interacting with the intruder. The recorded activities are analyzed by the network administrator and the rule database is updated. As a result, we improve the detection accuracy and security of the system using honeypot without any loss or damage to the original system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Provos, N., Holz, T.: Virtual Honeypots: from Botnet Tracking to Intrusion Detection. Pearson Education, New Delhi (2007)

    Google Scholar 

  2. Quynh, N.A., Takefuji, Y.: Towards an Invisible Honeypot Monitoring System, Information Security and Privacy. Springer, Berlin (2006)

    Google Scholar 

  3. Chamotra, S., et al.: Deployment of a low interaction honey pot in an organizational private network. In: International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), IEEE, 2011

    Google Scholar 

  4. Kuwatly, I., et al.: A dynamic honeypot design for intrusion detection. In: International Conference on Pervasive Services, ICPS 2004. IEEE/ACS, IEEE (2004)

    Google Scholar 

  5. Alata, E., et al.: Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint arXiv:0704.0858 (2007)

  6. Das, V.V.: Honeypot scheme for distributed denial-of-service. In: International Conference on Advanced Computer Control, ICACC’09. IEEE (2009)

    Google Scholar 

  7. Li, S., Schmitz, R.: A novel anti-phishing framework based on honeypots. IEEE (2009)

    Google Scholar 

  8. Zhuge, J., et al.: Collecting autonomous spreading malware using high-interaction honeypots. In: Information and Communications Security. Springer, Berlin, pp. 438–451 (2007)

    Google Scholar 

  9. Spitzner, L.: Honeypots: Catching the insider threat. In: Proceedings of 19th Annual Computer Security Applications Conference, IEEE (2003)

    Google Scholar 

  10. Almotairi, S., et al.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Fourth International Conference on Internet Monitoring and Protection, ICIMP’09. IEEE (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanchan Shendre .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Shendre, K., Sahu, S.K., Dash, R., Jena, S.K. (2016). Learning Probe Attack Patterns with Honeypots. In: Nagar, A., Mohapatra, D., Chaki, N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol 44. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2529-4_38

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2529-4_38

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2528-7

  • Online ISBN: 978-81-322-2529-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics