SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Journal of Computational Engineering Research||Vol, 04||Issue, 2||

DMZ: A trusted honeypot for secure transmission
1,

M.Buvaneswari , 2,M.P. Loganathan

Postal Address:6/16 Mohan Street, East Tambaram, Chennai-600059

ABSTRACT:
In general, denial of service is nothing but flooding of unrelated information over the network. This
causes, overload of network and higher bandwidth consumption. Therefore particular service
requested by authorized user cannot receive at particular time. Thus causes larger security threat in
network. When these system get distributed (distributed network), the mitigation becomes very
complex. In existing technique the DoS has been mitigated using many filtering technique. In order to
reduce the effect of DDoS attack we had introduced the concept of ihoneycol[1], which includes the
collaboration of firecol(intrusion prevention system) these forms a virtual mitigation shield around the
destination and safe guard from the source and honey pot(intrusion detection system). To improve
these security, we are going to introduce “trusted honey pot”. These can be done using honey token
and honey sign.

KEYWORDS: Denial of service, ihoneycol, honey pot, honey token, honey sign.

I.

INTRODUCTION:

Denial of service or otherwise generally known as packet flooding over the network. This leads to
exploitation of OS and causes major security threats[2]. Worms and viruses are also poses security issues which
are not related to denial of service attack.Denial of Service detection algorithm are located near the vulnerability
and victim vicinity around them. Here the detection of threat is made as flexible as possible. The major trade off
is that, the local response is made ineffective and the bandwidth occupies the upstream path.The most coupling
problem is that “IP ttraceback”[3] and “IP pushback”[4]. These aim to identify the attack and move on to
counter measures which lies near the source of threat. To deal with this problem “Fire Collaborator” has been
introduced which deals with the problem at ISP level. It takes the advantage of various IPS rules[5]. It is
detection and alert information sharing system that makes the IPS rules that mitigate the effect of denial of
service attack which is far from the victim destination. Honeypot is a trap set to detect unauthorized traffic
pattern for detection.

II.

RELATED WORKS:

Firecol” is either a hardware of software helps in reducing the effect of denial of service using many
IPS rules. Initially all the customer in the network register at ISP level. Each customer receives an UID(unique
identity) number. When more than one nodes use the same UID number then it is detected as a malicious or
unauthorized node. Firecol contains various IPS rules according to the detection of various traffic each rules will
be activated.
Fig 1.Firecol functions.

As we already seen that firecol contains many rules and these rules will be activated in the following
manner. The selection manager will determine the rules according to the attack and absorb the various malicious
traffic over the network. The score manager assigns the scores according to the belief traffic and the rules
designed. These scores can be exchanged as a token of trust within the neighbors in the network. The detection
manager reads and detect the various traffic among the authorized and unauthorized traffic from the clients.
The following are existing solution for denial of service attack:

||Issn 2250-3005 ||

||February||2014||

Page 40
DMZ:A Trusted Honeypot For Secure…
[1]

[2]

[3]

Attack prevention and pre-emption:
The attacks are prevented at the client side itself and the mode of mitigation done from far clients. Preemption is done when the authorized clients itself wanted to send the malicious data. To achieve this they
swap with neighbor network devices.
Attack detection and filtering:
Here the attack is detected and filtered according to various network traffic monitored by the detection
system. These traffic are registered as patterns. These filtering technique can be integrated in to firewall.
It can be either software or hardware.
Attack source and identification:
Once the attack is identified the main source of attack is detected and its IP address has been moved to
blacklist and stored in honeypot server.

Traditionally denial of service mitigation takes place in two major phases:
1.deployment phase: Here the deployment of many compromised nodes take place in network.
2. Attack phase: Here the attack mitigation and prevention takes place.
Reduction of Denial of Service include techniques like spoofing, prevention technique(Ingress and RPF
filtering[6]). The other includes manually employed countermeasures (firewall filtering, rate limiting or route
black holes[7]).Various abrupt traffic patterns are absorbed in multiple network domains[8]. These leads to very
accurate detections and communication overheads. Group testing is performed to identify the denial of service at
backend server[9]. Here various malicious traffic are distinguished.Denial of service also distinguish various
network traffic and quantify network[10]. This reduces false alarm rate over the network. In order to achieve
effective result, this honeypot should be integrated with any IPS system like firewall hardware or softwares[11].

III.

PROPOSED WORK:

In general, the client system will be arranged in form of network. The trusted transmission occur
among them using authentication and authorization procedures. The client forward the information via firecol
routers. These routers are made up of set of IPS rules(intrusion prevention system). They check the traffic
according to the rules embedded in it. Later the data get forwarded to load balancer in network. Here we use
“Non-cooperative scheme with communication” for attaining higher performance.The traffic here are classified
accordingly normal and abrupt traffic. Normal traffic are forwarded to original server or the destination.
Abnormal traffic patterns are detected and monitored by set of honeypot system called honeycomb.

Fig 1.2 Proposed Network
Honeycomb is defined as set of interconnected mesh network. They are multiprocessor system. The
group of honeypot performs similar task known as honeycomb.

IV.

HYBRID LOAD BALANCER:

Load balancing in general used to attain higher performance in transmission. Initially all the node get
registered with the server using their own IP address and load status of an individual node in network.
According to load( also trace the historical pattern and sends the maximum load it can take) the load balancer
allots a specific weights to all nodes. If the weight crosses the threshold value then that node is called as high
weight node, other called as light weight node. These weights are assigned within the fuzzy value interval of
[0,1]. The transmission takes place using all the light weight node irrespective of shortest path to attain higher
performance. Since we are taking the calculation of individual node we call it as “Non-cooperative scheme with
communication”.
||Issn 2250-3005 ||

||February||2014||

Page 41
DMZ:A Trusted Honeypot For Secure…

V.

TRUSTED HONEYCOMB:

Honeycomb contains the set of interconnecting mesh network computers. Each honeycomb contains set
of honeypot systems and honey servers. Honeypot are computer system whose values can be lied and can be
easily compromised. Each honeypot will be exchanging the trusted note by passing honey signatures. Honey
signatures are unique signature generated by each system and get stored in honey server. Each honey servers can
be recognized using honey token which was made initially while forming the network. Honeytokens are trusted
token exchanged among the various honey servers during regular interval of time dynamically.This honey comb
environment separately forms an de-militarized zone where it is invisible for authorized users.

VI.

CONCLUSION:

By considering the above technique as an effective way we can solve many network security threats. In
future I have planned to apply this for four various threat. The usage of signatures and tokens can be extended to
original servers using various algorithms.

REFERENCES
[1].
[2]
[3].
[4].
[5].
[6]
[7].
[8].
[9].
[10]
[11]

C.Siaterlis,B.Maglaris.”Detecting DDoS attacks with passive measurement based heuristics”,IEEE conference publication 2004.
S.Savage, D.Wetherall, A.Karlin, T.Anderson.
Practical network support for IP traceback”, proceedings of 2000ACM SIGCOMM conference.
J.Ioannidis and M.Bellovin. ”Implementing pushback,router based defense against DDoS attack”, proceeding of
NDSS,Feb2002.The internet society.
J.Francois,Adel,E.Atawy,E.Al-Shaee, R.Boutaba,”A collaborative approach for proactive detection of DDoS attack”,IEEE
transaction 2012.
CISCO.Remote triggered blackhole filtering.ftp//ftp_eng.cisco.com/cons/isp/
security/.
Kai Hwang and Wei-Shinn Ku,” A collaborative detection of DDoS attack over multiple domain”, IEEE journal 2007.
Yin Xuan, Incheol Shin, My T.Thai,Taieb Znati, ”Detecting application Denial of Service attack: A group testing based approach”,
IEEE publication 2009.
Yan Xiang,Ke LI,Wanlei Zhou,”Low rate DDoS attackdetection and traceback by using new information metrics”,IEEE publication
2011.
Nathalie Weiler,”Honeypots for DDoS attack”,IEEE conference publication 2002.
Satish.P and A.T.Chronopoulos, ”Dynamic multi user load balancing in distributed system”, IEEE publication 2007.
Christian K and Jon Crowcroft “Honeycomb- creating
intrusion detection signature using honeypot”
http://nms.lcs.mit.edu/HotNets-II/papers/honeycomb.pdf.

||Issn 2250-3005 ||

||February||2014||

Page 42

Más contenido relacionado

La actualidad más candente

Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypotpaperpublications3
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM ijcseit
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentationacaiani
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET Journal
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 

La actualidad más candente (20)

Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
Icmis
IcmisIcmis
Icmis
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypot
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
6
66
6
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentation
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
Wireless security
Wireless securityWireless security
Wireless security
 

Similar a DMZ honeypot for secure transmission

Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningeSAT Journals
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKScscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 

Similar a DMZ honeypot for secure transmission (20)

IJAEIT 20
IJAEIT 20IJAEIT 20
IJAEIT 20
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
M0704071074
M0704071074M0704071074
M0704071074
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
L017317681
L017317681L017317681
L017317681
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
574 501-507
574 501-507574 501-507
574 501-507
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

DMZ honeypot for secure transmission

  • 1. International Journal of Computational Engineering Research||Vol, 04||Issue, 2|| DMZ: A trusted honeypot for secure transmission 1, M.Buvaneswari , 2,M.P. Loganathan Postal Address:6/16 Mohan Street, East Tambaram, Chennai-600059 ABSTRACT: In general, denial of service is nothing but flooding of unrelated information over the network. This causes, overload of network and higher bandwidth consumption. Therefore particular service requested by authorized user cannot receive at particular time. Thus causes larger security threat in network. When these system get distributed (distributed network), the mitigation becomes very complex. In existing technique the DoS has been mitigated using many filtering technique. In order to reduce the effect of DDoS attack we had introduced the concept of ihoneycol[1], which includes the collaboration of firecol(intrusion prevention system) these forms a virtual mitigation shield around the destination and safe guard from the source and honey pot(intrusion detection system). To improve these security, we are going to introduce “trusted honey pot”. These can be done using honey token and honey sign. KEYWORDS: Denial of service, ihoneycol, honey pot, honey token, honey sign. I. INTRODUCTION: Denial of service or otherwise generally known as packet flooding over the network. This leads to exploitation of OS and causes major security threats[2]. Worms and viruses are also poses security issues which are not related to denial of service attack.Denial of Service detection algorithm are located near the vulnerability and victim vicinity around them. Here the detection of threat is made as flexible as possible. The major trade off is that, the local response is made ineffective and the bandwidth occupies the upstream path.The most coupling problem is that “IP ttraceback”[3] and “IP pushback”[4]. These aim to identify the attack and move on to counter measures which lies near the source of threat. To deal with this problem “Fire Collaborator” has been introduced which deals with the problem at ISP level. It takes the advantage of various IPS rules[5]. It is detection and alert information sharing system that makes the IPS rules that mitigate the effect of denial of service attack which is far from the victim destination. Honeypot is a trap set to detect unauthorized traffic pattern for detection. II. RELATED WORKS: Firecol” is either a hardware of software helps in reducing the effect of denial of service using many IPS rules. Initially all the customer in the network register at ISP level. Each customer receives an UID(unique identity) number. When more than one nodes use the same UID number then it is detected as a malicious or unauthorized node. Firecol contains various IPS rules according to the detection of various traffic each rules will be activated. Fig 1.Firecol functions. As we already seen that firecol contains many rules and these rules will be activated in the following manner. The selection manager will determine the rules according to the attack and absorb the various malicious traffic over the network. The score manager assigns the scores according to the belief traffic and the rules designed. These scores can be exchanged as a token of trust within the neighbors in the network. The detection manager reads and detect the various traffic among the authorized and unauthorized traffic from the clients. The following are existing solution for denial of service attack: ||Issn 2250-3005 || ||February||2014|| Page 40
  • 2. DMZ:A Trusted Honeypot For Secure… [1] [2] [3] Attack prevention and pre-emption: The attacks are prevented at the client side itself and the mode of mitigation done from far clients. Preemption is done when the authorized clients itself wanted to send the malicious data. To achieve this they swap with neighbor network devices. Attack detection and filtering: Here the attack is detected and filtered according to various network traffic monitored by the detection system. These traffic are registered as patterns. These filtering technique can be integrated in to firewall. It can be either software or hardware. Attack source and identification: Once the attack is identified the main source of attack is detected and its IP address has been moved to blacklist and stored in honeypot server. Traditionally denial of service mitigation takes place in two major phases: 1.deployment phase: Here the deployment of many compromised nodes take place in network. 2. Attack phase: Here the attack mitigation and prevention takes place. Reduction of Denial of Service include techniques like spoofing, prevention technique(Ingress and RPF filtering[6]). The other includes manually employed countermeasures (firewall filtering, rate limiting or route black holes[7]).Various abrupt traffic patterns are absorbed in multiple network domains[8]. These leads to very accurate detections and communication overheads. Group testing is performed to identify the denial of service at backend server[9]. Here various malicious traffic are distinguished.Denial of service also distinguish various network traffic and quantify network[10]. This reduces false alarm rate over the network. In order to achieve effective result, this honeypot should be integrated with any IPS system like firewall hardware or softwares[11]. III. PROPOSED WORK: In general, the client system will be arranged in form of network. The trusted transmission occur among them using authentication and authorization procedures. The client forward the information via firecol routers. These routers are made up of set of IPS rules(intrusion prevention system). They check the traffic according to the rules embedded in it. Later the data get forwarded to load balancer in network. Here we use “Non-cooperative scheme with communication” for attaining higher performance.The traffic here are classified accordingly normal and abrupt traffic. Normal traffic are forwarded to original server or the destination. Abnormal traffic patterns are detected and monitored by set of honeypot system called honeycomb. Fig 1.2 Proposed Network Honeycomb is defined as set of interconnected mesh network. They are multiprocessor system. The group of honeypot performs similar task known as honeycomb. IV. HYBRID LOAD BALANCER: Load balancing in general used to attain higher performance in transmission. Initially all the node get registered with the server using their own IP address and load status of an individual node in network. According to load( also trace the historical pattern and sends the maximum load it can take) the load balancer allots a specific weights to all nodes. If the weight crosses the threshold value then that node is called as high weight node, other called as light weight node. These weights are assigned within the fuzzy value interval of [0,1]. The transmission takes place using all the light weight node irrespective of shortest path to attain higher performance. Since we are taking the calculation of individual node we call it as “Non-cooperative scheme with communication”. ||Issn 2250-3005 || ||February||2014|| Page 41
  • 3. DMZ:A Trusted Honeypot For Secure… V. TRUSTED HONEYCOMB: Honeycomb contains the set of interconnecting mesh network computers. Each honeycomb contains set of honeypot systems and honey servers. Honeypot are computer system whose values can be lied and can be easily compromised. Each honeypot will be exchanging the trusted note by passing honey signatures. Honey signatures are unique signature generated by each system and get stored in honey server. Each honey servers can be recognized using honey token which was made initially while forming the network. Honeytokens are trusted token exchanged among the various honey servers during regular interval of time dynamically.This honey comb environment separately forms an de-militarized zone where it is invisible for authorized users. VI. CONCLUSION: By considering the above technique as an effective way we can solve many network security threats. In future I have planned to apply this for four various threat. The usage of signatures and tokens can be extended to original servers using various algorithms. REFERENCES [1]. [2] [3]. [4]. [5]. [6] [7]. [8]. [9]. [10] [11] C.Siaterlis,B.Maglaris.”Detecting DDoS attacks with passive measurement based heuristics”,IEEE conference publication 2004. S.Savage, D.Wetherall, A.Karlin, T.Anderson. Practical network support for IP traceback”, proceedings of 2000ACM SIGCOMM conference. J.Ioannidis and M.Bellovin. ”Implementing pushback,router based defense against DDoS attack”, proceeding of NDSS,Feb2002.The internet society. J.Francois,Adel,E.Atawy,E.Al-Shaee, R.Boutaba,”A collaborative approach for proactive detection of DDoS attack”,IEEE transaction 2012. CISCO.Remote triggered blackhole filtering.ftp//ftp_eng.cisco.com/cons/isp/ security/. Kai Hwang and Wei-Shinn Ku,” A collaborative detection of DDoS attack over multiple domain”, IEEE journal 2007. Yin Xuan, Incheol Shin, My T.Thai,Taieb Znati, ”Detecting application Denial of Service attack: A group testing based approach”, IEEE publication 2009. Yan Xiang,Ke LI,Wanlei Zhou,”Low rate DDoS attackdetection and traceback by using new information metrics”,IEEE publication 2011. Nathalie Weiler,”Honeypots for DDoS attack”,IEEE conference publication 2002. Satish.P and A.T.Chronopoulos, ”Dynamic multi user load balancing in distributed system”, IEEE publication 2007. Christian K and Jon Crowcroft “Honeycomb- creating intrusion detection signature using honeypot” http://nms.lcs.mit.edu/HotNets-II/papers/honeycomb.pdf. ||Issn 2250-3005 || ||February||2014|| Page 42