Ensuring The Network Security Using IDS & Honeypots
Ensuring The Network Security Using IDS & Honeypots
Ayushi.s
st
1 yr B.Sc computer science , M.O.P Vaishnav College for women
email: [email protected]
ABSTRACT-The primary focus of this paper is to manifest about the rousing trends to ensure the network security.by
using network security tools such as honeypots and ids(intrusion detection system) . Honey pots can be called as a
software or computer or a file that induces the hacker or the hostile computer activities to commit computer crimes or
illegal activities which the hacker feels is concealed but it is being monitored through honey pot. It is basically a
defense mechanism. Only the hackers will be caught and the other normal people are not allowed or prevented to
connect to it. whereas, an IDS(Intrusion Detection System) is an detection module or a tool used to detect malicious
activities.
F. Pouget, M. Dacier[3]defines“A honeypot consists Tremendous changes have been brought in the way we
in an environment where vulnerabilities have see the world, by the internet allowing us to
beendeliberately introduced in order to observe attacks communicate at the speed of light but this ability to
and intrusions.” share details across the enormousness of the internet
network is providing the intruders to exploit others
Lance Spitzner “Honeypots, tracking hackers” personal information and posing a threat to the
[Spit02] (2001) [4] the term ‘honeypot’ was coined by national security of our entire nation. Honeypots are
him. He defined “A honeypot is security resource the decoy systems which uses IDS(intrusion detection
whose value lies in being probed, attacked or systems) tools to detect the intrusions or malicious
compromised.” [Spit02, page 40] activities.
Reto Baumann [4]“A honeypot is a resource which Some people prefer the more labor-intensive
pretends to be a real target. A honeypot is expected to methodology called honeypot rather than trying to
be attacked or compromised. The main goals are the block a hacker (black hat) with a firewall or to find (or)
distraction of an attacker and the gain of information monitor an intruder with an intrusion detection system.
about an attack and the attacker.” [BauPla02]
So, for this a proper methodology or a desired
The University of Wisconsin-Platteville) as well as algorithm must be used such as explained
R.C. Barnett[5] mentions the following definition: generally:[5]
“An Internet-attached server that acts as a decoy,
luring in potential hackers in order to study their
activities and monitor how they are able to break into
a system. Honeypots are designed to mimic systems
that an intruder would like to break into but limit the
intruder from having access to an entire network. If a
honeypot is successful, the intruder will have no idea
that s/he is being tricked and monitored.” [Sour03]
3. Any kind of interaction with a honeypot is most 3. IDS can monitor traffic on a real time. So,
likely an unauthorized access or malicious network-based IDS can detect malicious
activity. activity as they occur [10]
4. Honeypots require minimal resources, as they 4. IDS sensor deployed outside the firewall can
only record the bad(illegal) activity. It uses a detect malicious attacks on resources behind the
defense mechanism. firewall [10]