Novel intrusion prediction mechanism based on honeypot log similarity
Ci‐Bin Jiang,
I‐Hsien Liu,
Yao‐Nien Chung and
Jung‐Shian Li
International Journal of Network Management, 2016, vol. 26, issue 3, 156-175
Abstract:
The current network‐based intrusion detection systems have a very high rate of false alarms, and this phenomena results in significant efforts to gauge the threat level of the anomalous traffic. In this paper, we propose an intrusion detection mechanism based on honeypot log similarity analysis and data mining techniques to predict and block suspicious flows before attacks occur. With honeypot logs and association rule mining, our approach can reduce the false alarm problem of intrusion detection because only suspicious traffic would be present in the honeypots. The proposed mechanism can reduce human effort, and the entire system can operate automatically. The results of our experiments indicate that the honeypot prediction system is practical for protecting assets from attacks or misuse.
Date: 2016
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://doi.org/10.1002/nem.1923
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wly:intnem:v:26:y:2016:i:3:p:156-175
Access Statistics for this article
More articles in International Journal of Network Management from John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().