Intelligent Firewall System using ANN and Decoy Data |
Author(s): |
Aditya Samant , NBN Sinhgad School of Engineering; Sudip Kumar Shrestha, NBN Sinhgad School of EngineeringNBN Sinhgad School of Engineering; Ashish Agarwal, NBN Sinhgad School of Engineering; Rahul Samant, NBN Sinhgad School of Engineering |
Keywords: |
Honey-pot, FF (Feed Forward), BPNN (Back Propagation neural network), ANN (Artificial neural network) |
Abstract |
A honey-pot is a non-production system, design to interact with cyber-attackers to retrieve intelligence on attack techniques and behaviors. With the increase in the dependency on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different situations. Implementations however falling into 3 major categories: high-interaction, medium-interaction, low-interaction. Honey-d, created by Niels Provos, is an open source project implemented as a small software daemon that creates virtual hosts on a network (low-interaction). High-interaction honey-pot systems are typically hardware replicas of existing operational components that include the appropriate software. These systems do not mimic services, but are deployed with working instances. Our type of system provides a high-interacting solution that is less prone to discovery of its deceptive purpose by network intruders. Therefore these issues can be addressed by our efficiently as the systems are at higher risk of facing an attack from an intruder. The system we speak of will perform interactions in Real time, data and records will be saved on a database primarily will be developed an NIDES(Next Generation Intrusion detection system).The system will provide the modules of port/socket scanning, packet scanning, SQL injection modules in the working manner. As such a system having or running these 3 modules together has not been taught of in the practical manner. |
Other Details |
Paper ID: IJSRDV3I1125 Published in: Volume : 3, Issue : 1 Publication Date: 01/04/2015 Page(s): 134-137 |
Article Preview |
|
|