Incorporating a Honeyfarm with NNMLFF IDS for Improving Intrusion Detection
Main Article Content
Abstract
Today’s networks must deal with dynamically changing threats each day. Use of static datasets to train and prepare multi-layer feed forward neural network intrusion detection systems (MLFFNN IDS) doesn’t address these new threats. The use of real traffic data to train neural network IDSs has been out of reach in organizations due to privacy and concerns. Now the use of a honeyfarm system can provide real-time data to a MLFFNN IDS so that it can adjust to new threats as they begin. This system also removes the privacy and concerns since information about the network is false and acts as a decoy to lure attackers away from the real organizational network. This paper introduces a honeyfarm architecture one can use with a MLFFNN IDS to improve intrusion detection capability.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
H. L. Ahmed, N. A. Elfeshawy, S. F. Elzoghdy, H. S. El-sayed, and O. S. Faragallah, “A neural network-based learning algorithm for intrusion detection systems.†Wireless Personal Communications 97, pp.3097-3112, 2017.
H. Artail, H. Safa, M. Sraj, I.Kuwatly, and Z. Al-Masri, “A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.†Computers & Security, 25, pp.274-288, 2006.
M. Baykara and R. Das, “A novel honeypot-based security approach for real-time intrusion detection and prevention systems.†Journal of Information Security and Applications, 41, pp.103-116, 2018.
Y. C. Cho, and J. Y. Pan, “Hybrid network defense model based on fuzzy evaluation.†The Scientific World Journal, 2014.
P. Kumar, and R. S. Verma, “A review on recent advances & future trends of security in honeypot.†International Journal of Advanced Research in Computer Science, 8(3), pp.1108-1113, March-April 2017.
L. Le Jeune, T. Goedeme, and N. Mentens, “Machine learning for misuse-based network intrusion detection: Overview, unified evaluation, and feature choice comparison framework.†IEEE Access, 9, pp.63995-64015, 2021.
. L. Ray, “Training and testing anomaly-based neural network intrusion detection systems.†International Journal of Information Security Science, 2(2), pp.57-63, 2013.
. L. Ray and H. Felch, “Improving performance and convergence rates in multi-layer feed forward neural network intrusion detection systems: A review of the literature.†International Journal of Strategic Information technology and Applications, 5(3), pp.24-36, 2014.
. L. Ray, “Challenges to multi-layer feed forward neural networks in intrusion detection.†Issues in Information Systems, 17(I), pp.89-98, 2016.
K. Rushikesh, “Study on honeypot based secure network system.†International Journal of Advanced Research in Computer Science, 10(3), pp.71-72, May-June 2019.
. T. Verwoerd, and R. Hunt, “Intrusion detection techniques and approaches.†Computer Communications, 25, pp.1356-1365, 2002.