A Survey on Deceptive Attack and Defense Game in Honeypot-Enabled Networks for IOT
Journal: International Journal of Computer Techniques (Vol.4, No. 2)Publication Date: 2017-03-01
Authors : - K.Thenmozhi E.Dilip kumar;
Page : 75-81
Keywords : Keywords—Data mining; Securities; Wiener process; Heston’s Model; Brownian Motion; Clustering; Neural Networks;
Abstract
Nowadays internet is growing faster and the number of people using the internet is also growing. Hence, global communication using internet is getting more important every day. On the other hand, attacks on internet are also increasing gradually. Many of the intrusion detection system and firewall are protected the network intrusion but it is not fully protect the current network attacks. Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. This paper presents defend against attackers in honeypot enabled networks and to monitor the attacker's behavior. In this paper we are taking the normal patterns to find if an attacker comes into the system and behaves an attack. If the pattern mismatches then we find out it is an attacker and it is moved to honeypot system. This paper helps us to create a well secured system and also to monitor the attacker suspicious or not.
Other Latest Articles
- Development of Remote Vehicle Monitoring System FOR Surveillance ApplicationsDevelopment of Remote Vehicle Monitoring System FOR Surveillance Applications
- Implementation of Maximum Power Point Tracking Algorithm Using Raspberry PI
- Application of Data Mining in Equity Market
- A New Data Hiding Technique Using CHAOS Embedded for Colour Image
- Development of a Robotic Vehicle and Implementation of a Control Strategy for Gesture Recognition through Leap Motion device
Last modified: 2017-12-12 13:14:02