SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 330
A CLOUD BASED HONEYNET SYSTEM FOR ATTACK DETECTION USING
MACHINE LEARNING TECHNIQUES
Mareena Marydas1, Varshapriya J N2
1Student, Dept. of Computer Engineering, VJTI, Mumbai, India
2Professor, Dept. of Computer Engineering, VJTI, Mumbai, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - The Cloud network nowadays, are compromised
and exploited by hackers. Large enterprise networks, such as
the network for a major university or any organization,
behave as enticing targets to be exploited by intruders. The
requirements for user freedom, prohibits the system
administrator to impose any kind of restrictions on the user.
And thus, it is important to secureour network, fordiscovering
unwanted activities, and build a trap system like the
honeypots. A honeypot is a well monitored network deception
tool designed to serve several purposes: itcan distract nemesis
from various interconnections in a network, layout an early
signal about new attacks and exploitation trends and allow
thorough and clear picture of the nemesis duringandafterthe
exploitation of the honeypot. A Honeynet is a collection of one
or more Honeypots. We propose a Honeynet system that
emphasizes on detecting any attack, or suspicious activity on
protocols like SSH, FTP etc. in our cloud network. These
techniques can be heuristically used to determine the
difference between Malicious and benign traffic. Also, this is a
comparative study as to which one of these Classification
algorithms would give us a low false positive rate.
Key Words: Cloud Computing, Honeynet, Classification
Algorithms, Openstack, Cloud instance
1. INTRODUCTION
Cloud computing has been defined byNISTasa model for
enabling convenient, on-demand network accesstoa shared
pool of configurable computingresourcesthatcanbequickly
provisioned and divulged with lesser effort and interaction
of Service providers[1]. Although reducing cost is a primary
goal of cloud providers, reducing the security shouldn’t be.
Monitoring and dealing with security issues remain the
priority of any organization, just as other important issues,
such as performance, availability, and recovery[2]. Most of
the incidents that occur on the cloud are not to exploit any
organization or its services. Instead, their objective is the
vulnerable victim.
At present it is not essential to know the way a system
functions, in order to be able to attack it therefore, present-
day companies require solutions that will not only
understand the tactics of the attacker but also supervise the
users who have gained access to the cloud system. [4]
Lance Spitzner, the founder of The Honeynet Project
organization, defines a honeypot as: “Honeypot could be
security resource whose worthliesinbeingprobed,attacked
or compromised” [5]. A Honeynet is a collection of
honeypots which is a decoy like system thatisintendedtobe
compromised, so as to study the intensions of an attacker
and to detect whether the system has been compromised or
attacked.
A Honeynet is a network, placed behind a firewall that
that encapsulates the ingress and the egress data. This data
is contained, examined, and controlled. Any type of system
can be placed within the Honeynet, to mimic the behavior of
the real systems we intend to protect. Other security tools
such as IDS and firewalls are passive in nature, as their task
is to detect and prevent attacks. Honeypots that are
deployed in our cloud give a way to the attacker to actively
intrude the system.
As in [4], one of the deployment issues is the number of
honeypots to be configured. Thus we propose a system that
consists of collection of various honeypots namely
Dionaea[10], Cowrie[11] and Honeytrap[12] which create a
honeynet. Such a honeynet will be used to capture traffic
from ports of different machines on the internet, which are
trying to gain access into our cloud system. The main issue
with the logs generated by the honeypot is the huge amount
of data that has to be analyzed and studied by a human
expert[13]. Hence the logs fetched from our honeynet will
then be effectively used as training set inputs to three
classification algorithms viz. SVM, Random ForestandNaïve
Bayes. The output would then help us determine a suitable
machine learning algorithm to a particular honeypot
according to accuracy. The proposed model is illustrated in
Fig.1.
We have created the private cloud environment by using
Openstack, launched two virtual machine instances on
Openstack, one being the attacker and one having the
honeypots configured to form a honeynet.
This paper is organized as follows: Section 2 describes
the review of Literature, Section 3 consists of information
about our Proposed system which further has subsections
describing about the Cloud environment, simulation and
traffic capture. The data logs gathered are analyzed and
studied in a tabular form in section 4. Lastly, we conclude
this research with future scope in Section 5.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 331
2. REVIEW OF LITERATURE
The first line of defense in the security of data, during
early times was to keep away theintrudersexclusively.Since
then various tools and technologies have been developed
diligently to avoid attacks. And hence in 1992, Marcus
Ranum developed the Firewall.[6]
System administrators protect the security of their
networks in numerous ways. The use of Firewall to filter the
traffic from the Internet, beforeit enterstheirnetwork isone
such method[6]. Firewalls help in protecting the
organizations and stop attackers from exploiting the
system[7]. Intrusion Detection Systems (IDS) are another
example of such tools allowing administrators to detect and
identify attacks or malicious events byanintruder.Butthese
tools at times, lack the capability of identifying new attacks
or collection of data regarding the attacker or the attacker’s
motive, which is very essential these days.Theproblemwith
firewalls or IDS is that it involves high amount of false
negative or false positive alerts. Honeypot when deployed
behind the firewall, serves as an in-depth defense system,
which can not only log the attackers who get through the
firewall but also detect any kind of perils from the insiders.
[8]
As in [3], Honeypots could be categorized as Low
Interaction, Medium Interaction and High Interaction:
i. Low interaction honeypots(Production honeypots):
They have limited interaction with the attacker and
are simple to deploy. They work by emulation of
services and systems. A production honeypot is
used to aid an organization in securing its internal
infrastructure. They generally do not give as much
information as research honeypots.
Examples of low interaction honeypot include KFSensor,
Honeyd, and Specter.
ii. Medium interaction honeypots allows some kind of
interaction with the attacker (i.e. bash shell). The
only difference is that attackers feel that they have
gained access into the system. But inrealitytheyare
just interacting with the emulated shell.
Examples include: Kippo, Cowrie, Dionaea, hornet.
iii. High Interaction honeypots(Research honeypots):
The primary mission of research honeypot is to
research or explore the threats organization may
face, such as who and how the attackers are, how
they are organized, what kind of tools they use to
attack other systems, and where did they obtainthe
tools from.
Examples of high interaction honeypot include Symantec
Decoy Server, Honeytrap and Honeynets.
As the attacks and the attackersgrowwiserandpowerful
each day with new exploits, it is important to secure our
network loop-holes. The thesis mentioned in [13] gives a
different dimension to implementation of different kinds of
honeypots. It focuses on an SMB Honeypot which is used for
collection of malwares like virus or worms. SMB is a widely
used protocol to propagate these attacks. Another type of
honeypot is the Honeypot-db. This honeypot logs all is able
to log all the traffic to and from the MySQL server with the
victims IP. The Honeypot can be configured even as a Web
Server[14]. The WS Honeypot is a highinteractionhoneypot.
It creates an interface which provides proper web services,
so that an intruder feels like an interaction with thereal web
server. To automate the process of collecting and analyzing
logs from the WS Honeypot, they’ve focused on developing
machine learning techniques like SVM(Support Vector
Machine).
Machine learning or data mining techniques like
Classification, Clustering etc. have been extensively used
these days due to the high amount of traffic logs generated
by the honeypot. It becomes extremely important to
distinguish between normal traffic and malicious traffic.
Thus various data mining techniques have been proposed to
extract useful and critical information from large
databases.[14] The classification relies on a learningdataset
built progressively that arranges a data itemintopredefined
groups. Clustering places data items into relatedgroupsthat
are unknown and it is up to the clustering algorithm to find
out most adaptable classes. Also another method of data
mining so used are the Association Rules.
Another method of deploying a honeypot is proposed in
[15] which is to deploy a Honeypot Router i.e. a honeypot
playing the role of a router. Such a honeypot is used to
analyze and study about attack patterns against routing
protocols like OSPF, RIP and BGP. And the data mining
algorithm used to analyze the logs was the DBScan
Clustering algorithm. DBScan was chosen over K-mean and
Cobweb clustering algorithms, because it gave lesser false
positives after testing.
Botnets are a set of compromised computers(malware)
which can be infected to attack other systems in the
network. To understand these attacks by the data collected,
a clustering structured visualization technique with outlier
detection is proposed in [16]. The algorithm used is the K-
Nearest Neighbour (KNN), with a local outlier definition,
Local Outlier Factor (LOF), whichhastogether beencalledas
KNOF, which is used for outlier detection to distinguish
between malicious and benign traffic.
In [17] classification techniques like SVM, Decision Tree
Method and Random forest are used to classify malware
according to their static and dynamic features. These
features are extracted and compared in terms of accuracy
and time. Among these, Random Forest Algorithm yields
maximum accuracy. It is very importantthesedaystoreduce
the rate of false positives and false negatives while
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 332
implementing any machine learning algorithm to improve
accuracy and yield proper results. In [18] the paper is
focused on complementary approaches to reduce the
number of false positives inIntrusionDetection.Itisreduced
by alert post-processing. They have verified and tested it on
both simulated and real Environments. And achieved a
significant decrease in the number of false positives.
3. PROPOSED SYSTEM
3.1 Cloud Environment
We have created a private cloud environment by using
Openstack to implement and test our proposed system.
Openstack enlarged into large community with more than
9000 organizations and 500 companies [19]. Openstack can
be defined as open source software platform which behaves
as a cloud and provides computing facilities specially
infrastructure service, where customers can deploy their
own instance (virtual machine) on cloud [20].
Each of the services in Openstack providesaninterface.It
depends on our needs whether we require some, or all
services. It is an open source software for creating private
and public clouds, built and disseminated by a large and
democratic community of developers, in collaboration with
users.
Openstack is an SDN(Software Defined Networking
Architecture) made up of different components such as
Controller, Compute and Network etc. These components
can be installed separately in different PC’s or all within a
single machine. We have configured the multinode
Openstack environment with three PCs
Fig -1: Architecture of our Honeynet
Configured as Controller(Keystone) Networking(Neutron)
and Compute(Cinder) nodes respectively[21].
As proposed all the three honeypots will be
configured, for which we will need an Ubuntu OS. So we
launch an Ubuntu Instance after the installation of
Openstack.
3.2 System Description
Any machine or system, trying to connect or
communicate with the cloud instance, sends a normal HTTP
request initially. Numerous victim machines can be splayed
out in the Honeynet and can execute different operating
systems. When requests are sent from one machine to
another, streams of packets are sent and received by the
external IP of the cloud. The data is gathered and sent for
future pre-processing into arff. format. Thisarff. Data format
is then given as input to three machine learning algorithms
to furnish maximum accuracy.
Our paper focuses on a comparative study of honeypots
which when deployedwith machinelearningalgorithms give
us a good accuracy rate. The three honeypots that form a
honeynet namely are:
i. Cowrie honeypot
Cowrie is an SSH honeypot which attempts to
masquerade an SSH Server specifically a server with weak
login password credentials. The logs collected depend on
SSH logins by the attacker.
ii. Dionaea Honeypot
It emulates a gullible Windows system with provided
services often targeted by intruders such as FTPHTTP,SMB,
etc. Dionaea forwards real time notifications via XMPP and
gathers its logs in SQLite database.
iii. Honeytrap Honeypot
Honeytrap is a framework used for managing sensors,
low interaction, medium interaction and high interaction
honeypots together. Honeytrap consists of services,
channels, directors and listeners. This honeypot executes a
dynamic server concept. It scans the network for incoming
traffic and starts suitable listeners, which handle many
connections.
3.3 Honeynet Simulation
Once the Honeypots are deployed on the cloud instance,
we start our Instance using the External IP of the cloud, in
the Browser, with the appropriate port number. Here we
create two instances, one the attacker instance and second
one the victim instance on which our honeypots are
deployed. And generate an SSH key for exchanging
information.
We simulate both the attacker and the victim machine in
our cloud instance and present the results accordingly. The
attacker instance will be running the MetasploitFramework
through which we will be experimenting with various
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 333
exploits on our victim cloud instance where the honeypots
are deployed.
3.4 Traffic Capture
As proposed, the attacker instance gets an IP
34.68.7.193 and thevictim/honeypotinstanceExternal IPis
35.222.214.147.
So firstly we do an Nmap scan on the victim machine to
find out open ports(Fig. 2)
Fig -2: Screenshot of NMAP scan on Victim
The open ports found are SSH, Telnet, FTP etc. We
demonstrate an ssh login attack(Fig. 3), which will belogged
by the Cowrie honeypot(Fig. 4).
Fig -3: Screenshot of SSH Login Attack on Victim
Fig -4: Screenshot of Cowrie Honeypot UI
Similarly other attacks on protocols like FTP, Http, Smbd
etc are performed and logged by Dionaea and Honeytrap
honeypots. The logs so formed, are captured to form
datasets. These datasets are imported in CSV format.
4. ANALYSIS AND RESULTS
In [14], it is stated that, to fetch good results from the
honeypots, the data collected, shouldfirstundergoa training
phase. In this phase, we let the machine learn according to
normal http requests that are not attacks.Thetrainingphase
takes place in a safe environment. The activities will be
classified according to their “message” field in the dataset.
Once the machine is trained, according to the selected
attributes in WEKA, then the Machine learning algorithms
are run, so as to obtain max accuracy.
Machine Learning Module:
i. Naïve Bayes Classification Algorithm
Naive Bayes is a classification technique which assumes
that a particular feature in a dataset are independent of the
other features. For example, considering a fruit, particularly
an orange. Features like its color (orange), shape (round)
and diameter (3 inches)areindependentfromothersamples
in the dataset, which contributestoa greater probabilitythat
this fruit is an orange and hence it’s called Naïve.
Naïve Bayes performs better in case of the huge size of
data, since they executeparallel map-reduceimplementation
on it, also because they are simple to train. Thus, this makes
it quicker than Random Forest and SVM. Even in our system,
when trained, Naïve Bayes takes lesser time to train the
model and test it. Although it gives lesser accuracy rate than
the others.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 334
Table -1: Comparison of Naïve Bayes Performances with
respect to honeypots in Honeynet
Accuracy True
Positive
False
Positive
Time
(Test
Model)
Cowrie 97.80 0.97 0.109 0.03
Dionaea 97.84 0.97 0.28 0.01
Honeytrap 94.56 0.94 0.176 0.02
ii. SVM: Support Vector Machine
SVM is a supervised machine learning algorithm that is
descriptive in nature as compared to Naïve Bayes which is a
generative model. It is based on a function given by y =
w.x+b, where weight (w) and bias (b) areestimatedfromthe
training data. SVMminimizesthegeneralizationerrorrather
than minimizing the training error [19].
As compared to performance, SVM performs better than
Naïve Bayes since it forms a hyperplane that maximizes the
margin of learning. In general, the SVM takes more time to
train than Naïve Bayes, but the predictions are more
accurate.
Table -2: Comparison of SVM Performances with respect
to honeypots in Honeynet
Accuracy True
Positive
False
Positive
Time
(Test
Model)
Cowrie 98.75 0.98 0.108 0.66
Dionaea 98.05 0.99 0.274 0.21
Honeytrap 97.44 0.97 0.168 13.29
iii. Random Forest
Random Forest is a supervised learning algorithm which
is a collection of Decision Trees. It is robust against
overfitting and works good with numerical data. It gives
importance to features, because it measurestheimpacteach
predictor has on the final results.
The great disadvantage of this algorithm is that, a high
number of trees may make the calculation and training
process slower and ineffective for real-time predictions.
Even with our system, it takes a sufficiently longer timethan
Naïve Bayes and SVM. Its accuracy is greater than Naïve
Bayes in comparison.
Table -3: Comparison of Random Forest Performances
with respect to honeypots in Honeynet
Accuracy True
Positive
False
Positive
Time
(Test
Model)
Cowrie 98.87 0.98 0.1 51.72
Dionaea 98.59 0.98 0.12 0.29
Honeytrap 98.37 0.98 0.98 7.5
5. CONCLUSION
In this paper, we presenteda Honeynetsystemconsisting
of three robust honeypots to detect attacks. To study the
logged activities by this Honeynet, we experimented with
three machine learninglearningtechniques. Wehavetrained
the models with Naïve Bayes, SVM and Random Forest, so
that new incoming data from these honeynets can be
classified as malicious with greater accuracy. The results so
obtained have been detailed in the paper.
As future work, we focus on reducing false negatives by
better better association with knowledge from the test
environment. We also plan to add other functionalities as to
automate the system more efficiently to reduce human
efforts and increase precision.
REFERENCES
[1] P. Mell, T. Grance, The NIST Definition of Cloud
Computing, Version 15, National Institute of Standards
and Technology, October 7, 2009,
http://csrc.nist.gov/groups/SNS/cloud-computing.
[2] Jansen, W. A. (2011). Cloud Hooks:SecurityandPrivacy
Issues in Cloud Computing. 2011 44th Hawaii
International Conference on System Sciences.
[3] Deepak R Bharadwaj, Anamika Bhattacharya and
Manivannan Chakkaravarthy “CloudThreatDefense– a
Threat Protection and Security Compliance Solution”,
IEEE International Conference on Cloud Computing in
Emerging Markets (CCEM), 2018.
[4] Kuwatly, I., Sraj, M., Al Masri, Z., and Artail, H. (2004) ‘A
dynamic honeypot design for intrusion detection’, In
Pervasive Services, 2004. ICPS 2004. IEEE/ACS
International Conference on (pp. 95-104). IEEE.
[5] Spitzner, L.Honeypot: Definitions and Values. May,
2002. http://www.spitzner.net.
[6] Velasco Silva, D. and, Rodríguez Rafael, G.D. ‘A Review
of the Current State of Honeynet Architectures and
Tools’, Int. J. Security and Networks,Vol.X,No.Y,pp.xx–
xx
[7] Levine, J., La Bella, R., Owen, H., Contis, D., & Culver, B.
(n.d.). “The use of Honeynets to detect exploited
systems across large enterprise networks”. IEEE
Systems, Man and Cybernetics Society Information
Assurance Workshop, 2003.
[8] Aliyev, Vusal. "Using honeypots to study skill level of
attackers based on the exploited vulnerabilities in the
network." Department of Computer Science and
Engineering Division of Computer Security CHALMERS
UNIVERSITY OF TECHNOLOGY Göteborg, Sweden,
2010.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 335
[9] Chao-Hsi Yeh, & Chung-Huang Yang. (2008). “Design
and implementation of honeypot systems based on
open-source software”. 2008 IEEE International
Conference on Intelligence and Security Informatics.
[10] Dionaea website.:HoneypotsCERTExerciseHandbook:
Honeypots CERT Exercise Handbook
[11] Cowrie Honeypot: https://null-
byte.wonderhowto.com/how to/use-cowrie-ssh-
honeypot-catch-attackers-your-network 0181600/
[12]Honeytrap :
http://honeytrap.carnivore.it/documentation/
[13] Nkwetta Jeffrey Asonganyi.( 2018) “Honey-system:
design, implementation and attack analysis.” Collegeof
Technology,University of Buea.
[14] Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula,
“Design and Implementation of Web Service
Honeypot,” IEEE, SoftCOM 2011, 19th International
Conference on Software, Telecommunications and
Computer Networks.
[15] Ghourabi, A., Abbes, T., & Bouhoula, A. (2010). “Data
analyzer based on data mining for Honeypot Router,”
ACS/IEEE International Conference on Computer
Systems and Applications - AICCSA 2010.
[16] H. Jin, O. Vel, K. Zhang and N. Liu, “KnowledgeDiscovery
from Honeypot Data for Monitoring MaliciousAttacks,”
In Proceedings of the 21st Australasian Joint
Conference on Artificial intelligence 2008, pp. 470-48
[17] Katerina Goseva-Popstojanova, et Al. “Characterization
and classification of malicious Webtraffic”inComputer
and Network Security, Vol: 42, pp. 92-115, 2014.
[18] Tadeusz Pietraszeka, Axel Tanner, "Data Mining and
Machine Learning—Towards Reducing False Positives
in Intrusion Detection." ACM Journal, Information
Security Tech. Report.Volume10Issue3,January,2005
[19] V. N. Vapnik, “The Nature of Statistical Learning
Theory,” SpringerVerlag New York, Inc., New York, NY,
USA, 1995
[20] Openstack :
https://vmokshagroup.com/tag/openstack/
[21] Openstack: https://en.wikipedia.org/wiki/OpenStack
[22] https://www.techsupportpk.com/2016/12/installing-
openstack-on-multi-node-in-linux.html
[23] https://www.linuxtechi.com/launch-instance-from
openstack-dashboard/
[24] https://www.geeksforgeeks.org/how-to-setup-
firewall-in-linux
[25] Weka:https://www.cs.vassar.edu/~cs366/docs/weka-
tutorial-full.pdf
[26] https://medium.com/machine-learning-101
[27] https://elitedatascience.com/machine-learning-
algorithms

More Related Content

What's hot

THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDTHRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
AM Publications,India
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
IJNSA Journal
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
IJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
journal ijrtem
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
AIRCC Publishing Corporation
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
ijcsit
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
ijsptm
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
Oyeniyi Samuel
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Invincea, Inc.
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2IAEME Publication
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
IRJET Journal
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
IJDKP
 

What's hot (19)

THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDTHRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2Secure masid secure multi agent system for intrusion detection-2
Secure masid secure multi agent system for intrusion detection-2
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 

Similar to IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learning Techniques

IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
IRJET Journal
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
CSCJournals
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
IRJET Journal
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
IJERA Editor
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
ijtsrd
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
IRJET Journal
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET Journal
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
ijtsrd
 

Similar to IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learning Techniques (20)

IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
M0704071074
M0704071074M0704071074
M0704071074
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learning Techniques

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 330 A CLOUD BASED HONEYNET SYSTEM FOR ATTACK DETECTION USING MACHINE LEARNING TECHNIQUES Mareena Marydas1, Varshapriya J N2 1Student, Dept. of Computer Engineering, VJTI, Mumbai, India 2Professor, Dept. of Computer Engineering, VJTI, Mumbai, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The Cloud network nowadays, are compromised and exploited by hackers. Large enterprise networks, such as the network for a major university or any organization, behave as enticing targets to be exploited by intruders. The requirements for user freedom, prohibits the system administrator to impose any kind of restrictions on the user. And thus, it is important to secureour network, fordiscovering unwanted activities, and build a trap system like the honeypots. A honeypot is a well monitored network deception tool designed to serve several purposes: itcan distract nemesis from various interconnections in a network, layout an early signal about new attacks and exploitation trends and allow thorough and clear picture of the nemesis duringandafterthe exploitation of the honeypot. A Honeynet is a collection of one or more Honeypots. We propose a Honeynet system that emphasizes on detecting any attack, or suspicious activity on protocols like SSH, FTP etc. in our cloud network. These techniques can be heuristically used to determine the difference between Malicious and benign traffic. Also, this is a comparative study as to which one of these Classification algorithms would give us a low false positive rate. Key Words: Cloud Computing, Honeynet, Classification Algorithms, Openstack, Cloud instance 1. INTRODUCTION Cloud computing has been defined byNISTasa model for enabling convenient, on-demand network accesstoa shared pool of configurable computingresourcesthatcanbequickly provisioned and divulged with lesser effort and interaction of Service providers[1]. Although reducing cost is a primary goal of cloud providers, reducing the security shouldn’t be. Monitoring and dealing with security issues remain the priority of any organization, just as other important issues, such as performance, availability, and recovery[2]. Most of the incidents that occur on the cloud are not to exploit any organization or its services. Instead, their objective is the vulnerable victim. At present it is not essential to know the way a system functions, in order to be able to attack it therefore, present- day companies require solutions that will not only understand the tactics of the attacker but also supervise the users who have gained access to the cloud system. [4] Lance Spitzner, the founder of The Honeynet Project organization, defines a honeypot as: “Honeypot could be security resource whose worthliesinbeingprobed,attacked or compromised” [5]. A Honeynet is a collection of honeypots which is a decoy like system thatisintendedtobe compromised, so as to study the intensions of an attacker and to detect whether the system has been compromised or attacked. A Honeynet is a network, placed behind a firewall that that encapsulates the ingress and the egress data. This data is contained, examined, and controlled. Any type of system can be placed within the Honeynet, to mimic the behavior of the real systems we intend to protect. Other security tools such as IDS and firewalls are passive in nature, as their task is to detect and prevent attacks. Honeypots that are deployed in our cloud give a way to the attacker to actively intrude the system. As in [4], one of the deployment issues is the number of honeypots to be configured. Thus we propose a system that consists of collection of various honeypots namely Dionaea[10], Cowrie[11] and Honeytrap[12] which create a honeynet. Such a honeynet will be used to capture traffic from ports of different machines on the internet, which are trying to gain access into our cloud system. The main issue with the logs generated by the honeypot is the huge amount of data that has to be analyzed and studied by a human expert[13]. Hence the logs fetched from our honeynet will then be effectively used as training set inputs to three classification algorithms viz. SVM, Random ForestandNaïve Bayes. The output would then help us determine a suitable machine learning algorithm to a particular honeypot according to accuracy. The proposed model is illustrated in Fig.1. We have created the private cloud environment by using Openstack, launched two virtual machine instances on Openstack, one being the attacker and one having the honeypots configured to form a honeynet. This paper is organized as follows: Section 2 describes the review of Literature, Section 3 consists of information about our Proposed system which further has subsections describing about the Cloud environment, simulation and traffic capture. The data logs gathered are analyzed and studied in a tabular form in section 4. Lastly, we conclude this research with future scope in Section 5.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 331 2. REVIEW OF LITERATURE The first line of defense in the security of data, during early times was to keep away theintrudersexclusively.Since then various tools and technologies have been developed diligently to avoid attacks. And hence in 1992, Marcus Ranum developed the Firewall.[6] System administrators protect the security of their networks in numerous ways. The use of Firewall to filter the traffic from the Internet, beforeit enterstheirnetwork isone such method[6]. Firewalls help in protecting the organizations and stop attackers from exploiting the system[7]. Intrusion Detection Systems (IDS) are another example of such tools allowing administrators to detect and identify attacks or malicious events byanintruder.Butthese tools at times, lack the capability of identifying new attacks or collection of data regarding the attacker or the attacker’s motive, which is very essential these days.Theproblemwith firewalls or IDS is that it involves high amount of false negative or false positive alerts. Honeypot when deployed behind the firewall, serves as an in-depth defense system, which can not only log the attackers who get through the firewall but also detect any kind of perils from the insiders. [8] As in [3], Honeypots could be categorized as Low Interaction, Medium Interaction and High Interaction: i. Low interaction honeypots(Production honeypots): They have limited interaction with the attacker and are simple to deploy. They work by emulation of services and systems. A production honeypot is used to aid an organization in securing its internal infrastructure. They generally do not give as much information as research honeypots. Examples of low interaction honeypot include KFSensor, Honeyd, and Specter. ii. Medium interaction honeypots allows some kind of interaction with the attacker (i.e. bash shell). The only difference is that attackers feel that they have gained access into the system. But inrealitytheyare just interacting with the emulated shell. Examples include: Kippo, Cowrie, Dionaea, hornet. iii. High Interaction honeypots(Research honeypots): The primary mission of research honeypot is to research or explore the threats organization may face, such as who and how the attackers are, how they are organized, what kind of tools they use to attack other systems, and where did they obtainthe tools from. Examples of high interaction honeypot include Symantec Decoy Server, Honeytrap and Honeynets. As the attacks and the attackersgrowwiserandpowerful each day with new exploits, it is important to secure our network loop-holes. The thesis mentioned in [13] gives a different dimension to implementation of different kinds of honeypots. It focuses on an SMB Honeypot which is used for collection of malwares like virus or worms. SMB is a widely used protocol to propagate these attacks. Another type of honeypot is the Honeypot-db. This honeypot logs all is able to log all the traffic to and from the MySQL server with the victims IP. The Honeypot can be configured even as a Web Server[14]. The WS Honeypot is a highinteractionhoneypot. It creates an interface which provides proper web services, so that an intruder feels like an interaction with thereal web server. To automate the process of collecting and analyzing logs from the WS Honeypot, they’ve focused on developing machine learning techniques like SVM(Support Vector Machine). Machine learning or data mining techniques like Classification, Clustering etc. have been extensively used these days due to the high amount of traffic logs generated by the honeypot. It becomes extremely important to distinguish between normal traffic and malicious traffic. Thus various data mining techniques have been proposed to extract useful and critical information from large databases.[14] The classification relies on a learningdataset built progressively that arranges a data itemintopredefined groups. Clustering places data items into relatedgroupsthat are unknown and it is up to the clustering algorithm to find out most adaptable classes. Also another method of data mining so used are the Association Rules. Another method of deploying a honeypot is proposed in [15] which is to deploy a Honeypot Router i.e. a honeypot playing the role of a router. Such a honeypot is used to analyze and study about attack patterns against routing protocols like OSPF, RIP and BGP. And the data mining algorithm used to analyze the logs was the DBScan Clustering algorithm. DBScan was chosen over K-mean and Cobweb clustering algorithms, because it gave lesser false positives after testing. Botnets are a set of compromised computers(malware) which can be infected to attack other systems in the network. To understand these attacks by the data collected, a clustering structured visualization technique with outlier detection is proposed in [16]. The algorithm used is the K- Nearest Neighbour (KNN), with a local outlier definition, Local Outlier Factor (LOF), whichhastogether beencalledas KNOF, which is used for outlier detection to distinguish between malicious and benign traffic. In [17] classification techniques like SVM, Decision Tree Method and Random forest are used to classify malware according to their static and dynamic features. These features are extracted and compared in terms of accuracy and time. Among these, Random Forest Algorithm yields maximum accuracy. It is very importantthesedaystoreduce the rate of false positives and false negatives while
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 332 implementing any machine learning algorithm to improve accuracy and yield proper results. In [18] the paper is focused on complementary approaches to reduce the number of false positives inIntrusionDetection.Itisreduced by alert post-processing. They have verified and tested it on both simulated and real Environments. And achieved a significant decrease in the number of false positives. 3. PROPOSED SYSTEM 3.1 Cloud Environment We have created a private cloud environment by using Openstack to implement and test our proposed system. Openstack enlarged into large community with more than 9000 organizations and 500 companies [19]. Openstack can be defined as open source software platform which behaves as a cloud and provides computing facilities specially infrastructure service, where customers can deploy their own instance (virtual machine) on cloud [20]. Each of the services in Openstack providesaninterface.It depends on our needs whether we require some, or all services. It is an open source software for creating private and public clouds, built and disseminated by a large and democratic community of developers, in collaboration with users. Openstack is an SDN(Software Defined Networking Architecture) made up of different components such as Controller, Compute and Network etc. These components can be installed separately in different PC’s or all within a single machine. We have configured the multinode Openstack environment with three PCs Fig -1: Architecture of our Honeynet Configured as Controller(Keystone) Networking(Neutron) and Compute(Cinder) nodes respectively[21]. As proposed all the three honeypots will be configured, for which we will need an Ubuntu OS. So we launch an Ubuntu Instance after the installation of Openstack. 3.2 System Description Any machine or system, trying to connect or communicate with the cloud instance, sends a normal HTTP request initially. Numerous victim machines can be splayed out in the Honeynet and can execute different operating systems. When requests are sent from one machine to another, streams of packets are sent and received by the external IP of the cloud. The data is gathered and sent for future pre-processing into arff. format. Thisarff. Data format is then given as input to three machine learning algorithms to furnish maximum accuracy. Our paper focuses on a comparative study of honeypots which when deployedwith machinelearningalgorithms give us a good accuracy rate. The three honeypots that form a honeynet namely are: i. Cowrie honeypot Cowrie is an SSH honeypot which attempts to masquerade an SSH Server specifically a server with weak login password credentials. The logs collected depend on SSH logins by the attacker. ii. Dionaea Honeypot It emulates a gullible Windows system with provided services often targeted by intruders such as FTPHTTP,SMB, etc. Dionaea forwards real time notifications via XMPP and gathers its logs in SQLite database. iii. Honeytrap Honeypot Honeytrap is a framework used for managing sensors, low interaction, medium interaction and high interaction honeypots together. Honeytrap consists of services, channels, directors and listeners. This honeypot executes a dynamic server concept. It scans the network for incoming traffic and starts suitable listeners, which handle many connections. 3.3 Honeynet Simulation Once the Honeypots are deployed on the cloud instance, we start our Instance using the External IP of the cloud, in the Browser, with the appropriate port number. Here we create two instances, one the attacker instance and second one the victim instance on which our honeypots are deployed. And generate an SSH key for exchanging information. We simulate both the attacker and the victim machine in our cloud instance and present the results accordingly. The attacker instance will be running the MetasploitFramework through which we will be experimenting with various
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 333 exploits on our victim cloud instance where the honeypots are deployed. 3.4 Traffic Capture As proposed, the attacker instance gets an IP 34.68.7.193 and thevictim/honeypotinstanceExternal IPis 35.222.214.147. So firstly we do an Nmap scan on the victim machine to find out open ports(Fig. 2) Fig -2: Screenshot of NMAP scan on Victim The open ports found are SSH, Telnet, FTP etc. We demonstrate an ssh login attack(Fig. 3), which will belogged by the Cowrie honeypot(Fig. 4). Fig -3: Screenshot of SSH Login Attack on Victim Fig -4: Screenshot of Cowrie Honeypot UI Similarly other attacks on protocols like FTP, Http, Smbd etc are performed and logged by Dionaea and Honeytrap honeypots. The logs so formed, are captured to form datasets. These datasets are imported in CSV format. 4. ANALYSIS AND RESULTS In [14], it is stated that, to fetch good results from the honeypots, the data collected, shouldfirstundergoa training phase. In this phase, we let the machine learn according to normal http requests that are not attacks.Thetrainingphase takes place in a safe environment. The activities will be classified according to their “message” field in the dataset. Once the machine is trained, according to the selected attributes in WEKA, then the Machine learning algorithms are run, so as to obtain max accuracy. Machine Learning Module: i. Naïve Bayes Classification Algorithm Naive Bayes is a classification technique which assumes that a particular feature in a dataset are independent of the other features. For example, considering a fruit, particularly an orange. Features like its color (orange), shape (round) and diameter (3 inches)areindependentfromothersamples in the dataset, which contributestoa greater probabilitythat this fruit is an orange and hence it’s called Naïve. Naïve Bayes performs better in case of the huge size of data, since they executeparallel map-reduceimplementation on it, also because they are simple to train. Thus, this makes it quicker than Random Forest and SVM. Even in our system, when trained, Naïve Bayes takes lesser time to train the model and test it. Although it gives lesser accuracy rate than the others.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 334 Table -1: Comparison of Naïve Bayes Performances with respect to honeypots in Honeynet Accuracy True Positive False Positive Time (Test Model) Cowrie 97.80 0.97 0.109 0.03 Dionaea 97.84 0.97 0.28 0.01 Honeytrap 94.56 0.94 0.176 0.02 ii. SVM: Support Vector Machine SVM is a supervised machine learning algorithm that is descriptive in nature as compared to Naïve Bayes which is a generative model. It is based on a function given by y = w.x+b, where weight (w) and bias (b) areestimatedfromthe training data. SVMminimizesthegeneralizationerrorrather than minimizing the training error [19]. As compared to performance, SVM performs better than Naïve Bayes since it forms a hyperplane that maximizes the margin of learning. In general, the SVM takes more time to train than Naïve Bayes, but the predictions are more accurate. Table -2: Comparison of SVM Performances with respect to honeypots in Honeynet Accuracy True Positive False Positive Time (Test Model) Cowrie 98.75 0.98 0.108 0.66 Dionaea 98.05 0.99 0.274 0.21 Honeytrap 97.44 0.97 0.168 13.29 iii. Random Forest Random Forest is a supervised learning algorithm which is a collection of Decision Trees. It is robust against overfitting and works good with numerical data. It gives importance to features, because it measurestheimpacteach predictor has on the final results. The great disadvantage of this algorithm is that, a high number of trees may make the calculation and training process slower and ineffective for real-time predictions. Even with our system, it takes a sufficiently longer timethan Naïve Bayes and SVM. Its accuracy is greater than Naïve Bayes in comparison. Table -3: Comparison of Random Forest Performances with respect to honeypots in Honeynet Accuracy True Positive False Positive Time (Test Model) Cowrie 98.87 0.98 0.1 51.72 Dionaea 98.59 0.98 0.12 0.29 Honeytrap 98.37 0.98 0.98 7.5 5. CONCLUSION In this paper, we presenteda Honeynetsystemconsisting of three robust honeypots to detect attacks. To study the logged activities by this Honeynet, we experimented with three machine learninglearningtechniques. Wehavetrained the models with Naïve Bayes, SVM and Random Forest, so that new incoming data from these honeynets can be classified as malicious with greater accuracy. The results so obtained have been detailed in the paper. As future work, we focus on reducing false negatives by better better association with knowledge from the test environment. We also plan to add other functionalities as to automate the system more efficiently to reduce human efforts and increase precision. REFERENCES [1] P. Mell, T. Grance, The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, October 7, 2009, http://csrc.nist.gov/groups/SNS/cloud-computing. [2] Jansen, W. A. (2011). Cloud Hooks:SecurityandPrivacy Issues in Cloud Computing. 2011 44th Hawaii International Conference on System Sciences. [3] Deepak R Bharadwaj, Anamika Bhattacharya and Manivannan Chakkaravarthy “CloudThreatDefense– a Threat Protection and Security Compliance Solution”, IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2018. [4] Kuwatly, I., Sraj, M., Al Masri, Z., and Artail, H. (2004) ‘A dynamic honeypot design for intrusion detection’, In Pervasive Services, 2004. ICPS 2004. IEEE/ACS International Conference on (pp. 95-104). IEEE. [5] Spitzner, L.Honeypot: Definitions and Values. May, 2002. http://www.spitzner.net. [6] Velasco Silva, D. and, Rodríguez Rafael, G.D. ‘A Review of the Current State of Honeynet Architectures and Tools’, Int. J. Security and Networks,Vol.X,No.Y,pp.xx– xx [7] Levine, J., La Bella, R., Owen, H., Contis, D., & Culver, B. (n.d.). “The use of Honeynets to detect exploited systems across large enterprise networks”. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003. [8] Aliyev, Vusal. "Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network." Department of Computer Science and Engineering Division of Computer Security CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden, 2010.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 335 [9] Chao-Hsi Yeh, & Chung-Huang Yang. (2008). “Design and implementation of honeypot systems based on open-source software”. 2008 IEEE International Conference on Intelligence and Security Informatics. [10] Dionaea website.:HoneypotsCERTExerciseHandbook: Honeypots CERT Exercise Handbook [11] Cowrie Honeypot: https://null- byte.wonderhowto.com/how to/use-cowrie-ssh- honeypot-catch-attackers-your-network 0181600/ [12]Honeytrap : http://honeytrap.carnivore.it/documentation/ [13] Nkwetta Jeffrey Asonganyi.( 2018) “Honey-system: design, implementation and attack analysis.” Collegeof Technology,University of Buea. [14] Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula, “Design and Implementation of Web Service Honeypot,” IEEE, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks. [15] Ghourabi, A., Abbes, T., & Bouhoula, A. (2010). “Data analyzer based on data mining for Honeypot Router,” ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010. [16] H. Jin, O. Vel, K. Zhang and N. Liu, “KnowledgeDiscovery from Honeypot Data for Monitoring MaliciousAttacks,” In Proceedings of the 21st Australasian Joint Conference on Artificial intelligence 2008, pp. 470-48 [17] Katerina Goseva-Popstojanova, et Al. “Characterization and classification of malicious Webtraffic”inComputer and Network Security, Vol: 42, pp. 92-115, 2014. [18] Tadeusz Pietraszeka, Axel Tanner, "Data Mining and Machine Learning—Towards Reducing False Positives in Intrusion Detection." ACM Journal, Information Security Tech. Report.Volume10Issue3,January,2005 [19] V. N. Vapnik, “The Nature of Statistical Learning Theory,” SpringerVerlag New York, Inc., New York, NY, USA, 1995 [20] Openstack : https://vmokshagroup.com/tag/openstack/ [21] Openstack: https://en.wikipedia.org/wiki/OpenStack [22] https://www.techsupportpk.com/2016/12/installing- openstack-on-multi-node-in-linux.html [23] https://www.linuxtechi.com/launch-instance-from openstack-dashboard/ [24] https://www.geeksforgeeks.org/how-to-setup- firewall-in-linux [25] Weka:https://www.cs.vassar.edu/~cs366/docs/weka- tutorial-full.pdf [26] https://medium.com/machine-learning-101 [27] https://elitedatascience.com/machine-learning- algorithms