ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Deceptive Attack and Defense Game in Honeypot-Enabled Networks for IOT

Journal: International Journal of Engineering and Techniques (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 72-77

Keywords : Data mining; Securities; Wiener process; Heston’s Model; Brownian Motion; Clustering; Neural Network;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays internet is growing faster and the number of people using the internet is also growing. Hence, global communication using internet is getting more important every day. On the other hand, attacks on internet are also increasing gradually. Many of the intrusion detection system and firewall are protected the network intrusion but it is not fully protect the current network attacks. Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. This paper presents defend against attackers in honeypot enabled networks and to monitor the attacker's behavior. In this paper we are taking the normal patterns to find if an attacker comes into the system and behaves an attack. If the pattern mismatches then we find out it is an attacker and it is moved to honeypot system. This paper helps us to create a well secured system and also to monitor the attacker suspicious or not.

Last modified: 2018-05-19 17:09:26