SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Journal of Computational Engineering Research||Vol, 04||Issue, 2||

DMZ: A trusted honeypot for secure transmission
1,

M.Buvaneswari , 2,M.P. Loganathan

Postal Address:6/16 Mohan Street, East Tambaram, Chennai-600059

ABSTRACT:
In general, denial of service is nothing but flooding of unrelated information over the network. This
causes, overload of network and higher bandwidth consumption. Therefore particular service
requested by authorized user cannot receive at particular time. Thus causes larger security threat in
network. When these system get distributed (distributed network), the mitigation becomes very
complex. In existing technique the DoS has been mitigated using many filtering technique. In order to
reduce the effect of DDoS attack we had introduced the concept of ihoneycol[1], which includes the
collaboration of firecol(intrusion prevention system) these forms a virtual mitigation shield around the
destination and safe guard from the source and honey pot(intrusion detection system). To improve
these security, we are going to introduce “trusted honey pot”. These can be done using honey token
and honey sign.

KEYWORDS: Denial of service, ihoneycol, honey pot, honey token, honey sign.

I.

INTRODUCTION:

Denial of service or otherwise generally known as packet flooding over the network. This leads to
exploitation of OS and causes major security threats[2]. Worms and viruses are also poses security issues which
are not related to denial of service attack.Denial of Service detection algorithm are located near the vulnerability
and victim vicinity around them. Here the detection of threat is made as flexible as possible. The major trade off
is that, the local response is made ineffective and the bandwidth occupies the upstream path.The most coupling
problem is that “IP ttraceback”[3] and “IP pushback”[4]. These aim to identify the attack and move on to
counter measures which lies near the source of threat. To deal with this problem “Fire Collaborator” has been
introduced which deals with the problem at ISP level. It takes the advantage of various IPS rules[5]. It is
detection and alert information sharing system that makes the IPS rules that mitigate the effect of denial of
service attack which is far from the victim destination. Honeypot is a trap set to detect unauthorized traffic
pattern for detection.

II.

RELATED WORKS:

Firecol” is either a hardware of software helps in reducing the effect of denial of service using many
IPS rules. Initially all the customer in the network register at ISP level. Each customer receives an UID(unique
identity) number. When more than one nodes use the same UID number then it is detected as a malicious or
unauthorized node. Firecol contains various IPS rules according to the detection of various traffic each rules will
be activated.
Fig 1.Firecol functions.

As we already seen that firecol contains many rules and these rules will be activated in the following
manner. The selection manager will determine the rules according to the attack and absorb the various malicious
traffic over the network. The score manager assigns the scores according to the belief traffic and the rules
designed. These scores can be exchanged as a token of trust within the neighbors in the network. The detection
manager reads and detect the various traffic among the authorized and unauthorized traffic from the clients.
The following are existing solution for denial of service attack:

||Issn 2250-3005 ||

||February||2014||

Page 40
DMZ:A Trusted Honeypot For Secure…
[1]

[2]

[3]

Attack prevention and pre-emption:
The attacks are prevented at the client side itself and the mode of mitigation done from far clients. Preemption is done when the authorized clients itself wanted to send the malicious data. To achieve this they
swap with neighbor network devices.
Attack detection and filtering:
Here the attack is detected and filtered according to various network traffic monitored by the detection
system. These traffic are registered as patterns. These filtering technique can be integrated in to firewall.
It can be either software or hardware.
Attack source and identification:
Once the attack is identified the main source of attack is detected and its IP address has been moved to
blacklist and stored in honeypot server.

Traditionally denial of service mitigation takes place in two major phases:
1.deployment phase: Here the deployment of many compromised nodes take place in network.
2. Attack phase: Here the attack mitigation and prevention takes place.
Reduction of Denial of Service include techniques like spoofing, prevention technique(Ingress and RPF
filtering[6]). The other includes manually employed countermeasures (firewall filtering, rate limiting or route
black holes[7]).Various abrupt traffic patterns are absorbed in multiple network domains[8]. These leads to very
accurate detections and communication overheads. Group testing is performed to identify the denial of service at
backend server[9]. Here various malicious traffic are distinguished.Denial of service also distinguish various
network traffic and quantify network[10]. This reduces false alarm rate over the network. In order to achieve
effective result, this honeypot should be integrated with any IPS system like firewall hardware or softwares[11].

III.

PROPOSED WORK:

In general, the client system will be arranged in form of network. The trusted transmission occur
among them using authentication and authorization procedures. The client forward the information via firecol
routers. These routers are made up of set of IPS rules(intrusion prevention system). They check the traffic
according to the rules embedded in it. Later the data get forwarded to load balancer in network. Here we use
“Non-cooperative scheme with communication” for attaining higher performance.The traffic here are classified
accordingly normal and abrupt traffic. Normal traffic are forwarded to original server or the destination.
Abnormal traffic patterns are detected and monitored by set of honeypot system called honeycomb.

Fig 1.2 Proposed Network
Honeycomb is defined as set of interconnected mesh network. They are multiprocessor system. The
group of honeypot performs similar task known as honeycomb.

IV.

HYBRID LOAD BALANCER:

Load balancing in general used to attain higher performance in transmission. Initially all the node get
registered with the server using their own IP address and load status of an individual node in network.
According to load( also trace the historical pattern and sends the maximum load it can take) the load balancer
allots a specific weights to all nodes. If the weight crosses the threshold value then that node is called as high
weight node, other called as light weight node. These weights are assigned within the fuzzy value interval of
[0,1]. The transmission takes place using all the light weight node irrespective of shortest path to attain higher
performance. Since we are taking the calculation of individual node we call it as “Non-cooperative scheme with
communication”.
||Issn 2250-3005 ||

||February||2014||

Page 41
DMZ:A Trusted Honeypot For Secure…

V.

TRUSTED HONEYCOMB:

Honeycomb contains the set of interconnecting mesh network computers. Each honeycomb contains set
of honeypot systems and honey servers. Honeypot are computer system whose values can be lied and can be
easily compromised. Each honeypot will be exchanging the trusted note by passing honey signatures. Honey
signatures are unique signature generated by each system and get stored in honey server. Each honey servers can
be recognized using honey token which was made initially while forming the network. Honeytokens are trusted
token exchanged among the various honey servers during regular interval of time dynamically.This honey comb
environment separately forms an de-militarized zone where it is invisible for authorized users.

VI.

CONCLUSION:

By considering the above technique as an effective way we can solve many network security threats. In
future I have planned to apply this for four various threat. The usage of signatures and tokens can be extended to
original servers using various algorithms.

REFERENCES
[1].
[2]
[3].
[4].
[5].
[6]
[7].
[8].
[9].
[10]
[11]

C.Siaterlis,B.Maglaris.”Detecting DDoS attacks with passive measurement based heuristics”,IEEE conference publication 2004.
S.Savage, D.Wetherall, A.Karlin, T.Anderson.
Practical network support for IP traceback”, proceedings of 2000ACM SIGCOMM conference.
J.Ioannidis and M.Bellovin. ”Implementing pushback,router based defense against DDoS attack”, proceeding of
NDSS,Feb2002.The internet society.
J.Francois,Adel,E.Atawy,E.Al-Shaee, R.Boutaba,”A collaborative approach for proactive detection of DDoS attack”,IEEE
transaction 2012.
CISCO.Remote triggered blackhole filtering.ftp//ftp_eng.cisco.com/cons/isp/
security/.
Kai Hwang and Wei-Shinn Ku,” A collaborative detection of DDoS attack over multiple domain”, IEEE journal 2007.
Yin Xuan, Incheol Shin, My T.Thai,Taieb Znati, ”Detecting application Denial of Service attack: A group testing based approach”,
IEEE publication 2009.
Yan Xiang,Ke LI,Wanlei Zhou,”Low rate DDoS attackdetection and traceback by using new information metrics”,IEEE publication
2011.
Nathalie Weiler,”Honeypots for DDoS attack”,IEEE conference publication 2002.
Satish.P and A.T.Chronopoulos, ”Dynamic multi user load balancing in distributed system”, IEEE publication 2007.
Christian K and Jon Crowcroft “Honeycomb- creating
intrusion detection signature using honeypot”
http://nms.lcs.mit.edu/HotNets-II/papers/honeycomb.pdf.

||Issn 2250-3005 ||

||February||2014||

Page 42

Más contenido relacionado

La actualidad más candente

Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypotpaperpublications3
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM ijcseit
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentationacaiani
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET Journal
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 

La actualidad más candente (20)

Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
Icmis
IcmisIcmis
Icmis
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypot
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
6
66
6
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentation
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
Wireless security
Wireless securityWireless security
Wireless security
 

Similar a DMZ honeypot for secure transmission

Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningeSAT Journals
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKScscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 

Similar a DMZ honeypot for secure transmission (20)

IJAEIT 20
IJAEIT 20IJAEIT 20
IJAEIT 20
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
M0704071074
M0704071074M0704071074
M0704071074
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
L017317681
L017317681L017317681
L017317681
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
574 501-507
574 501-507574 501-507
574 501-507
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 

Último

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

DMZ honeypot for secure transmission

  • 1. International Journal of Computational Engineering Research||Vol, 04||Issue, 2|| DMZ: A trusted honeypot for secure transmission 1, M.Buvaneswari , 2,M.P. Loganathan Postal Address:6/16 Mohan Street, East Tambaram, Chennai-600059 ABSTRACT: In general, denial of service is nothing but flooding of unrelated information over the network. This causes, overload of network and higher bandwidth consumption. Therefore particular service requested by authorized user cannot receive at particular time. Thus causes larger security threat in network. When these system get distributed (distributed network), the mitigation becomes very complex. In existing technique the DoS has been mitigated using many filtering technique. In order to reduce the effect of DDoS attack we had introduced the concept of ihoneycol[1], which includes the collaboration of firecol(intrusion prevention system) these forms a virtual mitigation shield around the destination and safe guard from the source and honey pot(intrusion detection system). To improve these security, we are going to introduce “trusted honey pot”. These can be done using honey token and honey sign. KEYWORDS: Denial of service, ihoneycol, honey pot, honey token, honey sign. I. INTRODUCTION: Denial of service or otherwise generally known as packet flooding over the network. This leads to exploitation of OS and causes major security threats[2]. Worms and viruses are also poses security issues which are not related to denial of service attack.Denial of Service detection algorithm are located near the vulnerability and victim vicinity around them. Here the detection of threat is made as flexible as possible. The major trade off is that, the local response is made ineffective and the bandwidth occupies the upstream path.The most coupling problem is that “IP ttraceback”[3] and “IP pushback”[4]. These aim to identify the attack and move on to counter measures which lies near the source of threat. To deal with this problem “Fire Collaborator” has been introduced which deals with the problem at ISP level. It takes the advantage of various IPS rules[5]. It is detection and alert information sharing system that makes the IPS rules that mitigate the effect of denial of service attack which is far from the victim destination. Honeypot is a trap set to detect unauthorized traffic pattern for detection. II. RELATED WORKS: Firecol” is either a hardware of software helps in reducing the effect of denial of service using many IPS rules. Initially all the customer in the network register at ISP level. Each customer receives an UID(unique identity) number. When more than one nodes use the same UID number then it is detected as a malicious or unauthorized node. Firecol contains various IPS rules according to the detection of various traffic each rules will be activated. Fig 1.Firecol functions. As we already seen that firecol contains many rules and these rules will be activated in the following manner. The selection manager will determine the rules according to the attack and absorb the various malicious traffic over the network. The score manager assigns the scores according to the belief traffic and the rules designed. These scores can be exchanged as a token of trust within the neighbors in the network. The detection manager reads and detect the various traffic among the authorized and unauthorized traffic from the clients. The following are existing solution for denial of service attack: ||Issn 2250-3005 || ||February||2014|| Page 40
  • 2. DMZ:A Trusted Honeypot For Secure… [1] [2] [3] Attack prevention and pre-emption: The attacks are prevented at the client side itself and the mode of mitigation done from far clients. Preemption is done when the authorized clients itself wanted to send the malicious data. To achieve this they swap with neighbor network devices. Attack detection and filtering: Here the attack is detected and filtered according to various network traffic monitored by the detection system. These traffic are registered as patterns. These filtering technique can be integrated in to firewall. It can be either software or hardware. Attack source and identification: Once the attack is identified the main source of attack is detected and its IP address has been moved to blacklist and stored in honeypot server. Traditionally denial of service mitigation takes place in two major phases: 1.deployment phase: Here the deployment of many compromised nodes take place in network. 2. Attack phase: Here the attack mitigation and prevention takes place. Reduction of Denial of Service include techniques like spoofing, prevention technique(Ingress and RPF filtering[6]). The other includes manually employed countermeasures (firewall filtering, rate limiting or route black holes[7]).Various abrupt traffic patterns are absorbed in multiple network domains[8]. These leads to very accurate detections and communication overheads. Group testing is performed to identify the denial of service at backend server[9]. Here various malicious traffic are distinguished.Denial of service also distinguish various network traffic and quantify network[10]. This reduces false alarm rate over the network. In order to achieve effective result, this honeypot should be integrated with any IPS system like firewall hardware or softwares[11]. III. PROPOSED WORK: In general, the client system will be arranged in form of network. The trusted transmission occur among them using authentication and authorization procedures. The client forward the information via firecol routers. These routers are made up of set of IPS rules(intrusion prevention system). They check the traffic according to the rules embedded in it. Later the data get forwarded to load balancer in network. Here we use “Non-cooperative scheme with communication” for attaining higher performance.The traffic here are classified accordingly normal and abrupt traffic. Normal traffic are forwarded to original server or the destination. Abnormal traffic patterns are detected and monitored by set of honeypot system called honeycomb. Fig 1.2 Proposed Network Honeycomb is defined as set of interconnected mesh network. They are multiprocessor system. The group of honeypot performs similar task known as honeycomb. IV. HYBRID LOAD BALANCER: Load balancing in general used to attain higher performance in transmission. Initially all the node get registered with the server using their own IP address and load status of an individual node in network. According to load( also trace the historical pattern and sends the maximum load it can take) the load balancer allots a specific weights to all nodes. If the weight crosses the threshold value then that node is called as high weight node, other called as light weight node. These weights are assigned within the fuzzy value interval of [0,1]. The transmission takes place using all the light weight node irrespective of shortest path to attain higher performance. Since we are taking the calculation of individual node we call it as “Non-cooperative scheme with communication”. ||Issn 2250-3005 || ||February||2014|| Page 41
  • 3. DMZ:A Trusted Honeypot For Secure… V. TRUSTED HONEYCOMB: Honeycomb contains the set of interconnecting mesh network computers. Each honeycomb contains set of honeypot systems and honey servers. Honeypot are computer system whose values can be lied and can be easily compromised. Each honeypot will be exchanging the trusted note by passing honey signatures. Honey signatures are unique signature generated by each system and get stored in honey server. Each honey servers can be recognized using honey token which was made initially while forming the network. Honeytokens are trusted token exchanged among the various honey servers during regular interval of time dynamically.This honey comb environment separately forms an de-militarized zone where it is invisible for authorized users. VI. CONCLUSION: By considering the above technique as an effective way we can solve many network security threats. In future I have planned to apply this for four various threat. The usage of signatures and tokens can be extended to original servers using various algorithms. REFERENCES [1]. [2] [3]. [4]. [5]. [6] [7]. [8]. [9]. [10] [11] C.Siaterlis,B.Maglaris.”Detecting DDoS attacks with passive measurement based heuristics”,IEEE conference publication 2004. S.Savage, D.Wetherall, A.Karlin, T.Anderson. Practical network support for IP traceback”, proceedings of 2000ACM SIGCOMM conference. J.Ioannidis and M.Bellovin. ”Implementing pushback,router based defense against DDoS attack”, proceeding of NDSS,Feb2002.The internet society. J.Francois,Adel,E.Atawy,E.Al-Shaee, R.Boutaba,”A collaborative approach for proactive detection of DDoS attack”,IEEE transaction 2012. CISCO.Remote triggered blackhole filtering.ftp//ftp_eng.cisco.com/cons/isp/ security/. Kai Hwang and Wei-Shinn Ku,” A collaborative detection of DDoS attack over multiple domain”, IEEE journal 2007. Yin Xuan, Incheol Shin, My T.Thai,Taieb Znati, ”Detecting application Denial of Service attack: A group testing based approach”, IEEE publication 2009. Yan Xiang,Ke LI,Wanlei Zhou,”Low rate DDoS attackdetection and traceback by using new information metrics”,IEEE publication 2011. Nathalie Weiler,”Honeypots for DDoS attack”,IEEE conference publication 2002. Satish.P and A.T.Chronopoulos, ”Dynamic multi user load balancing in distributed system”, IEEE publication 2007. Christian K and Jon Crowcroft “Honeycomb- creating intrusion detection signature using honeypot” http://nms.lcs.mit.edu/HotNets-II/papers/honeycomb.pdf. ||Issn 2250-3005 || ||February||2014|| Page 42