Incorporating a Honeyfarm with NNMLFF IDS for Improving Intrusion Detection

Main Article Content

loye ray

Abstract

Today’s networks must deal with dynamically changing threats each day. Use of static datasets to train and prepare multi-layer feed forward neural network intrusion detection systems (MLFFNN IDS) doesn’t address these new threats. The use of real traffic data to train neural network IDSs has been out of reach in organizations due to privacy and concerns. Now the use of a honeyfarm system can provide real-time data to a MLFFNN IDS so that it can adjust to new threats as they begin. This system also removes the privacy and concerns since information about the network is false and acts as a decoy to lure attackers away from the real organizational network. This paper introduces a honeyfarm architecture one can use with a MLFFNN IDS to improve intrusion detection capability.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

loye ray, Colorado Technical University

Dr Loye Ray is an adjunct professor at the University of Maryland University College and Colorado Technical University. He teaches and develops graduate and doctorate level cybersecurity courses. Loye has been teaching for nearly 30 years. He has held senior positions in industry, federal service and academics. His research areas include software security, network security and neural networks. He holds degrees in electrical engineering, business administration and computer science.

References

H. L. Ahmed, N. A. Elfeshawy, S. F. Elzoghdy, H. S. El-sayed, and O. S. Faragallah, “A neural network-based learning algorithm for intrusion detection systems.†Wireless Personal Communications 97, pp.3097-3112, 2017.

H. Artail, H. Safa, M. Sraj, I.Kuwatly, and Z. Al-Masri, “A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.†Computers & Security, 25, pp.274-288, 2006.

M. Baykara and R. Das, “A novel honeypot-based security approach for real-time intrusion detection and prevention systems.†Journal of Information Security and Applications, 41, pp.103-116, 2018.

Y. C. Cho, and J. Y. Pan, “Hybrid network defense model based on fuzzy evaluation.†The Scientific World Journal, 2014.

P. Kumar, and R. S. Verma, “A review on recent advances & future trends of security in honeypot.†International Journal of Advanced Research in Computer Science, 8(3), pp.1108-1113, March-April 2017.

L. Le Jeune, T. Goedeme, and N. Mentens, “Machine learning for misuse-based network intrusion detection: Overview, unified evaluation, and feature choice comparison framework.†IEEE Access, 9, pp.63995-64015, 2021.

. L. Ray, “Training and testing anomaly-based neural network intrusion detection systems.†International Journal of Information Security Science, 2(2), pp.57-63, 2013.

. L. Ray and H. Felch, “Improving performance and convergence rates in multi-layer feed forward neural network intrusion detection systems: A review of the literature.†International Journal of Strategic Information technology and Applications, 5(3), pp.24-36, 2014.

. L. Ray, “Challenges to multi-layer feed forward neural networks in intrusion detection.†Issues in Information Systems, 17(I), pp.89-98, 2016.

K. Rushikesh, “Study on honeypot based secure network system.†International Journal of Advanced Research in Computer Science, 10(3), pp.71-72, May-June 2019.

. T. Verwoerd, and R. Hunt, “Intrusion detection techniques and approaches.†Computer Communications, 25, pp.1356-1365, 2002.