A Survey on Deceptive Attack and Defense Game in Honeypot-Enabled Networks for IOT
Journal: International Journal of Engineering and Techniques (Vol.3, No. 3)Publication Date: 2017-05-01
Authors : K.Thenmozhi E.Dilip kumar;
Page : 72-77
Keywords : Data mining; Securities; Wiener process; Heston’s Model; Brownian Motion; Clustering; Neural Network;
Abstract
Nowadays internet is growing faster and the number of people using the internet is also growing. Hence, global communication using internet is getting more important every day. On the other hand, attacks on internet are also increasing gradually. Many of the intrusion detection system and firewall are protected the network intrusion but it is not fully protect the current network attacks. Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. This paper presents defend against attackers in honeypot enabled networks and to monitor the attacker's behavior. In this paper we are taking the normal patterns to find if an attacker comes into the system and behaves an attack. If the pattern mismatches then we find out it is an attacker and it is moved to honeypot system. This paper helps us to create a well secured system and also to monitor the attacker suspicious or not.
Other Latest Articles
- A Threshold Multi-Authority Access Control System
- Development of Remote Vehicle Monitoring System FOR Surveillance Applications
- A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile AD HOC Network
- Mechanical Engineering in Ancient Egypt, Part 43: Statues of Horse, Leopard, Turtle and Frog
- Implementation of Maximum Power Point Tracking Algorithm Using Raspberry PI
Last modified: 2018-05-19 17:09:26