0% found this document useful (0 votes)
55 views

Ensuring The Network Security Using IDS & Honeypots

The document discusses ensuring network security using intrusion detection systems (IDS) and honeypots. Honeypots are designed to attract and monitor hackers without providing access to real systems. An IDS monitors network traffic to detect malicious activity. The author proposes using a honeypot-based system with three components: a low-interaction honeypot to attract attacks, a configuration component, and an IDS communication component to detect intrusions and prevent them from affecting real systems. This system is intended to monitor enterprise network traffic and analyze it to avoid intruding activities.

Uploaded by

Ayushi Khatod
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Ensuring The Network Security Using IDS & Honeypots

The document discusses ensuring network security using intrusion detection systems (IDS) and honeypots. Honeypots are designed to attract and monitor hackers without providing access to real systems. An IDS monitors network traffic to detect malicious activity. The author proposes using a honeypot-based system with three components: a low-interaction honeypot to attract attacks, a configuration component, and an IDS communication component to detect intrusions and prevent them from affecting real systems. This system is intended to monitor enterprise network traffic and analyze it to avoid intruding activities.

Uploaded by

Ayushi Khatod
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Ensuring the network security using IDS & honeypots:

Ayushi.s
st
1 yr B.Sc computer science , M.O.P Vaishnav College for women
email: [email protected]

ABSTRACT-The primary focus of this paper is to manifest about the rousing trends to ensure the network security.by
using network security tools such as honeypots and ids(intrusion detection system) . Honey pots can be called as a
software or computer or a file that induces the hacker or the hostile computer activities to commit computer crimes or
illegal activities which the hacker feels is concealed but it is being monitored through honey pot. It is basically a
defense mechanism. Only the hackers will be caught and the other normal people are not allowed or prevented to
connect to it. whereas, an IDS(Intrusion Detection System) is an detection module or a tool used to detect malicious
activities.

INDEX TERMS- Honeynet;blackhats;firewall;snort;false positives; MySQL database.

1. INTRODUCTION: logs on your network, identifying malicious traffic in


a sea of legitimate activity can be both difficult and
On the account of rapidly increasing rate of time consuming[2].It is an device or an application
cybercrimes in today’s world it has become eminent to which monitors intruding activities that tends to hack
have a preventive measure for it, to reduce these networks (blackhat community).
crimes which are done online using a network can be
reduced by using honeypots and ids systems. The SIEM(security information and event
management) system collects the information about
Honeypots are more and more used to collect data on any malicious activity or violation that is typically
malicious activities on the Internet and to better reported to an administrator. Its types ranges from
understand the strategies and techniques used by large networks to single computers. As soon as the
attackers to compromise target systems[1]. It is intrusion activity has been detected it signals an alarm.
basically a technique employed to catch the hostile
users who pose a threat to network and security, it also 2. REVIEW OF LITERATURE:
ensures to reduce the security threats such as
viruses,worms,crackers or internet attacks which the anon_100036097 [1] defined the IDS and honeypots
normal users face. It basically creates intuition for the as the IDS (Intrusion Detection System) gathers
hackers to attack it as they are closely monitored the information within a LAN/CAN aboutunauthorized
network administrator is alerted before a possible access as well as misuse. An IDS isalso referred as
trespassing activity. Now a days in this increasing packet sniffer. An IDS evaluatesa suspected intrusion
aeon of technology,the restless usage of internet plays
once it has taken placeand signals an alarm. And a
a major role in all the activities ranging from
education,money transfer and other online banking honeypot is a trap set to detect, deflect, or in some
transactions.If we want all our tasks to undergo in a manner counteract attempts at unauthorized use of
safe manner then we must ensure security in the information systems. Generally, it consists of a
network we use or we are connected to for which computer, data or a network site that appears to be part
honey pots are used. Although a honeypot appears and of a network, but is actually isolated and monitored,
behaves like a real network,it has that capacity to and which seems to contain information or a resource
attract hackers and offers easy exploitable flaws to
encourage the blackhats to waste their time using this of value to attackers
fictional network.There are different types of
honeypots used which will be mentioned in this. Tejvir Kaur1, Vimmi Malhotra2, Dr. Dheerendra
Singh3 [2] examined the Intrusion as the act of
Intrusion detection is a complex business. Whether violating the security policy that pertains to an
you deploy an intrusion detection system (IDS), or information system. Intrusion detection can be defined
you gather and examine the computer and device
as the act of detecting actions that attempt to 3. METHODOLOGY:
compromise the confidentiality, integrity or
availability of a resource. 3.1. Honeypots:

F. Pouget, M. Dacier[3]defines“A honeypot consists Tremendous changes have been brought in the way we
in an environment where vulnerabilities have see the world, by the internet allowing us to
beendeliberately introduced in order to observe attacks communicate at the speed of light but this ability to
and intrusions.” share details across the enormousness of the internet
network is providing the intruders to exploit others
Lance Spitzner “Honeypots, tracking hackers” personal information and posing a threat to the
[Spit02] (2001) [4] the term ‘honeypot’ was coined by national security of our entire nation. Honeypots are
him. He defined “A honeypot is security resource the decoy systems which uses IDS(intrusion detection
whose value lies in being probed, attacked or systems) tools to detect the intrusions or malicious
compromised.” [Spit02, page 40] activities.

Reto Baumann [4]“A honeypot is a resource which Some people prefer the more labor-intensive
pretends to be a real target. A honeypot is expected to methodology called honeypot rather than trying to
be attacked or compromised. The main goals are the block a hacker (black hat) with a firewall or to find (or)
distraction of an attacker and the gain of information monitor an intruder with an intrusion detection system.
about an attack and the attacker.” [BauPla02]
So, for this a proper methodology or a desired
The University of Wisconsin-Platteville) as well as algorithm must be used such as explained
R.C. Barnett[5] mentions the following definition: generally:[5]
“An Internet-attached server that acts as a decoy,
luring in potential hackers in order to study their
activities and monitor how they are able to break into
a system. Honeypots are designed to mimic systems
that an intruder would like to break into but limit the
intruder from having access to an entire network. If a
honeypot is successful, the intruder will have no idea
that s/he is being tricked and monitored.” [Sour03]

Uwe Aickelin,Julie Greensmith,Jamie Twycross


(2004) [6] examined that IDSs are software systems
designed to identify and prevent the misuse of
computer networks and systems.

There are a number of different ways to classify IDSs.


Here we focus on two ways: the analysis approach and
the placement of the IDS, although there has been
recent work on alternative taxonomies. Regarding the
former, there are two classes: misuse detection and
anomaly detection.

Tejvir Kaur1, Vimmi Malhotra2, Dr. Dheerendra Figure 1 Architecture of honeypots


Singh3(2014) [7] analyzed that the Intrusion Detection
System (IDS) helps information systems to deal with
attacks. This is accomplished by collecting This forms a basic process in which attacker attacks a
information from a variety of systems and network computer(potential victim) which is nothing but a trap
sources. The information collected is analyzed for for hackers (honeypot) when many systems attack
possible security problems. together the attack is redirected to another network of
honeypot. Likewise, many honeypots combined Honeypotserver application consists of three
together forms a honeynet as illustrated in Figure 1. components: low-
interactionattackattractioncomponent,configurationco
Another proposed methodology is as follows:[6] mponent and IDS communications component.

From figure2,it is seen that In our application to  Attackattractioncomponent:Thiscomponentisa


monitor enterprise network traffic, analyze it well and lowinteractionhoneypotthathastheskillofattackatt
to avoid intruding activities a honeypot-based attack ractionandit
detection and prevention design has been hasbeenprovidedbythehoneyapplication.Thisco
developed.The basic components for this developed mponent is the part which includes a mechanism
application can be viewed in three groups that can attract the intruders.
respectively,[ 6 ] “the honeypot server application”  Configurationcomponent:Bythiscomponent,th
that can simulate trap systems, “the monitor eIDSandthe
application” on which the animations are displayed honeyapplications’attackattractioncomponenttha
that are detected from honeypot communication tcanbe configured.
server, and by this monitor application honeypot  IDScommunicationscomponent:Thiscompone
server application many configurations are done, and ntprovidesthe honeypot server module tobe able
“the IDS application” which is a server application to communicate with IDS module.
where the packets come to the honeypot server by
trapping and are sent to the monitor.It is known that
in LAN region as shown in Figure 2, recognizing a 3.1.2. Simple algorithm’s flow chart is as follows:[4]
honeypot causes significant security risks. So,
inthisperformedapplication,theattackattractioncompo From figure 3, it can be seen that whenever the given
nentof honeypot is made as low-interaction. for the conditions are satisfied the control is transferred for
integrity of the accomplishing application, the honeypot to honeycentre and then followed by to the
honeypot server application is implemented in C additional server. Then the data that is gathered about
#programming language. the hackers is processed and then honeycentre sends
the information to the web server and all the
instructions are executed,

Where as, if the given conditions are not satisfied the


honeycentre sends an error report to the network
administrator of related web server or incrementation
takes place.

Figure 2 Expanded structure of enterprise LAN

3.1.1. Honeypot server module:


3.2 Types of honeypots:

There are different varieties of honeypots: they can be


classified on the basis of their level of
involvement(design) and based on their deployment.

Based on deployment honeypots are classified as:

(1) Production honeypots


And
(2) research honeypots

3.2.1. Production honeypots:

Production honeypots are placed by an organization


inside the production network with other production
servers to improve their overall state of security.
Generally, production honeypots are low-interaction
honeypots, which are easier to establish. They provide
somewhat less information about the attacks or
attackers than research honeypots do. These are easy
to use, they capture only limited information, and are
used primarily by companies or corporations. [3]

3.2.2. Research honeypots:

They capture extensive information, and are used


primarily by research, military, or government
organizations. Research honeypots are complex to
maintain as well as establish , They are used most
often to gather information about the tactics and
motives of the intruders community targeting different
networks. Research honeypots as they do not add any
direct value to a specific organization so they are used
to research about the threats organizers and helps us to
learn how to be better protective against those
threats.[3]

Based on involvement(design) honeypots are


classified as:

(1) Low-interaction honeypots.


(2) Medium-interaction honeypots.
(3) High-interaction honeypots.

3.2.3. Low-interaction honeypots:


Low-interaction honeypots represent the intruders
imitated services with a limited subset of the
functionality they would expect from a server, with the
Figure 3 A basic algorithm used in honeypot intent of detecting sources from an unauthorized
activity. For example, the HTTP service provided on
low-interaction honeypots would only support the
commands needed to identify that a known exploit is overflows, server message block probes [7] .A
being attempted. Further more, they replicate the proposed algorithm(flowchart) is as follows:
services frequently requested by attackers .Since, they
consume relatively few resources, multiple virtual
machines can easily be hosted on one physical system.
Because , the virtual systems have a short response
time, and less code is required it theryby reduces the
complexity of the security of the virtual systems.[3]

3.2.4. Medium-interaction honeypots:


Some authors classify a third categoryof honeypot
called medium-interaction honeypots, as they provide
an expanded interaction over low-interaction
honeypots but less than high-interaction
systems. They only provide partial implementation of
services and do not allow typical, full interaction with
the system as of high-interaction honeypots.They,
might more fully implement the HTTP protocol to
emulate(establish) a well-known vendor’s
implementation, such as Apache.[3]

3.2.5. High-interaction honeypots:


Figure 4 Algorithm used by IDS
In accordance to the recent researchers, the technology
using high interaction honeypots , with the help of
utilizing virtual machines, multiple honeypots can be IDS(intrusion detection system) uses this algorithm to
hosted on a single physical machine. Incase even if one detect intruding activities where Snort is used as an
of the honeypot is compromised, it can be re-imposed intrusion detection system to provide alerts for the
more quickly. These honeypots imitate the activities potential intrusions. The alerts generated by IDS are
of the real systems that host a variety of services.(no instinctually logged by Snort to MySQL database from
emulation ) .It lets the intruder interact with the system
where they are read by the proposed software and are
as they would do on any regular operating system, with
the goal of capturing the maximum amount of used to prevent the potential intrusion [8]. IDS uses
information on the attacker’s techniques.Although only the first two sections from above model:
high interaction honeypots provide more security by snort(software) and MYSQL database where alerts are
being difficult to detect, but it has the main drawback stored.
that it is very costly to maintain.[3]
3.3.1 The proposed methodology is as follows: [8]
3. 3. Intrusion Detection System (IDS):
From figure 5, To detect the distrustful activity both at
For any security network,intrusion detection and
the network & host level IDS using various methods
prevention are necessary.Priory,firewalls were
and techniques.Intruders have signatures that can be
eminently used for network security but now
detected[8] and on the basis of it is able to find the
IDS(intrusion detection systems) are used to detect
malicious activities running on computer and generate
any kind of malicious activity.For this detection
alerts using alarm network. In the above model
purposes many types of software are used such as
multiple server systems are connected to a firewall that
snort(software). Snort is a free open source network
is again used to protect (a network or system) from
intrusion detection system (IDS) and intrusion
unauthorized access with a firewall. And then the
prevention system (IPS) created in 1998 by Martin
whole thing is connected to alarm network through
Roesch, former founder and CTO of Sourcefire. Snort
IDS.
is now developed by Cisco , The program can also be
used to detect probes or attacks, including, but not
limited to, operating system
fingerprintingattempts, semantic URL attacks, buffer
commonly used tools for simulating network intrusion
detection systems [10].

3.4.2 Host intrusion detection systems:


The systems that runs on individual hosts or devices
on a network are called as Host intrusion detection
systems (HIDS). It will alert the user or administrator
only if suspicious activity is detected as HIDS
monitors the inbound and outbound packets from the
device only. It takes a snapshot of existing system
files and matches it to the previous snapshot. If the
critical system files were modified or deleted, an alert
is sent to the administrator to investigate. An example
of HIDS usage can be seen on mission critical
Figure 5 Methodology used in IDS systems machines, which are not expected to change their
configurations [10].

3.4. Types of IDS (intrusion detection systems): Detection methods:


3.4.3. signature -based:
The most common classifications are:
This terminology originates from anti-virus software,
(1) Network intrusion detection system (NIDS)- which refers to these detected patterns as signatures..
That is, it is a system that analyzes On-time updation of the IDS with the signature is a
incoming network traffic. key aspect .Signature-based IDS refers to the
(2) Host-based intrusion detection system detection of attacks by looking for specific patterns,
such as byte sequences in network traffic, or known
(HIDS)
intruding instruction sequences used by malware .
That is, it is a system that monitors Although signature-based IDS can easily detect
important operating system files. known attacks, it is difficult to detect new attacks, for
which no pattern is available [10].
By detection approach, we can classify IDS as:
3.4.4. Anomaly -based:
(1) Signature-based detection (used for In contrast with signature based detection ,Anomaly-
recognizing bad patterns (malware)) based intrusion detection systems were primarily
(2) Anomaly-based detection (detecting introduced to detect unknown attacks, in part due to
deviations from a model of "good" traffic, the rapid development of malware. The basic
which often relies on machine learning) approach is to use machine learning to create a model
of trustworthy activity, and then compare new
behavior against this model. Although this approach
3.4.1. Network intrusion detection systems: enables the detection of previously unknown attacks,
it may suffer from false positives: previously
NIDS can be also combined with other technologies to unknown legitimate activity may also be classified as
increase detection, and prediction rates. It performs an malicious [10].
analysis of passing traffic on the entire subnet, and
matches the traffic that is passed on the subnets to the
library of known attacks. Network intrusion detection
systems (NIDS) are placed at a strategic point or points
within the network to monitor traffic to and from all
devices on the network. Once an attack is identified,
or abnormal behavior is sensed, the alert can be sent to
the administrator. OPNET and NETSIM are
3.5. Pros and cons:

Table 1. Advantages and Disadvantages .

Honeypots Intrusion detection systems(IDS)


Advantages: Advantages:
1. Honeypots are designed to apprehend anything 1. IDS are easier to utilize as it does not affect
thrown at them, including tools or tactics that existing systems or infrastructure[10]
have never been seen before.
2. Honeypots can collect small amounts of 2. NIDS(network-based IDS) sensors can detect
information.. Instead of generating 10,000 alerts many attacks by inspecting the packet headers
a day, they can generate only 10 alerts a day. for any intruding attack like TCP SYN attack
Instead of logging a two GB of data a day, they fragmented packet attack etc. [10]
can log only two MB of data a day

3. Any kind of interaction with a honeypot is most 3. IDS can monitor traffic on a real time. So,
likely an unauthorized access or malicious network-based IDS can detect malicious
activity. activity as they occur [10]

4. Honeypots require minimal resources, as they 4. IDS sensor deployed outside the firewall can
only record the bad(illegal) activity. It uses a detect malicious attacks on resources behind the
defense mechanism. firewall [10]

5. Honeypots work in encrypted or IPv6 5. It is a detection mechanism [10]


environments unlike most security technologies
(such as IDS systems). It does not matter what
the intruder guys throw at a honeypot, the
honeypot will detect and record it.

6. Simplicity: Finally, honeypots are conceptually


very simple.
Dis-advantages: Dis –advantages:
1. If they honeypots are used by hackers then it can 1. IDS is not an alternative to strong user
be used to attack other system making it a bane identification and authentication mechanism
for us. [10]
2. It can only track and record the activity that 2. IDS is not a solution to all security concerns
directly interacts with them. It will not capture andHuman intervention is required to
attacks against other systems unless the attacker investigate the attack once it is detected and
or threat interacts with the honeypots. reported [10]
3. If a hacker is too smart then he can potentially 3. False positives occur when IDS incorrectly
detect the honeypot’s trap. identify normal activity as being malicious.
Whereas, False negatives occur when IDS fail to
detect the malicious activity [10]

4. CONCLUSION: the other provides us with a defense system


thereby ensuring network’s security.
Honeypots and IDS both acts as an eminent Honey pots as well as IDS acts as flexible
tool for observing the hacker’s movements as tools with wide variety of applications for
well as preparing the system for future security purposes. Their main purpose is
attacks. If one provides a detection system detection of malicious activities and to gather
that information.Honeypots are a new and [6] MuhammetBaykara, ResulDas“A novel honeypot
interesting field in the sector of network based security approach for real-time intrusion
security,while IDS is an old field in detection and prevention systems”
https://www.researchgate.net/publication/326746050
comparison to it but has a wide variety of
_A_novel_honeypot_based_security_approach_for_r
fields in it than honeypots.Currently, there is eal-
a lot of ongoing research and discussions time_intrusion_detection_and_prevention_systems
about them all around the world. No other August 2018
method or technique is comparable in the
efficiency of a honeypot if gathering [7] snort(software)
information is a primary goal, especially if https://en.wikipedia.org/wiki/Snort_(software)
the tools an attacker uses are of interest. As
honeypots are getting more advanced,
[8] Muhammad Naveed1 , Shams un Nihar2 ,
hackers will also develop methods to detect
Mohammad Inayatullah Babar3 “Network Intrusion
such systems,but before the hackers detect it, Prevention by Configuring ACLs on the Routers,
we should also improvise the network based on Snort IDS alerts “
security techniques then, A regular arms race https://www.researchgate.net/profile/Muhammad
could start between the good people and the _Naveed23/publication/224196023_Network_intru
Blackhat community(hackers). sion_prevention_by_configuring_ACLs_on_the_r
outers_based_on_Snort_IDS_alerts/links/0f31753
ba67dd73266000000.pdf

REFERENCES: [9] Tejvir Kaur1 ,Vimmi Malhotra2 , Dr. Dheerendra


Singh “Comparison of network security tools-
[1] M. Kaâniche1, E. Alata1, V. Nicomette1, Y. Firewall, Intrusion Detection System and Honeypot”
Deswarte1, M. Dacier2 1LAAS-CNRS, “Empirical February-2014
Analysis and Statistical Modeling of Attack https://pdfs.semanticscholar.org/c437/2e695acd7636
Processes based on Honeypots”,Université de 367c106d6c347544ed131b98.pdf
Toulouse 7 Avenue du Colonel Roche, 31077
Toulouse Cedex 4, France [10] “Intrusion Detection System” Wikipedia
https://arxiv.org/pdf/0704.0861 https://en.wikipedia.org/wiki/Intrusion_detection_sys
tem
[2] Roger A.Grimes“ Intrusion detection honeypots
simplify network security”
https://www.networkworld.com/article/2194777/secu
rity/intrusion-detection-honeypots-simplify-network-
security.html
Columnist, InfoWorld | NOV 17, 2010

[3] Mohit Arora“Various Types Of


HoneyPots”September 17,
2015 https://catchupdates.com/honeypots/

[4] Bahman Nikkhahan, Sahar Sohrabi, and


ShahriarMohammadi “Using Honeypots to Secure E-
Government Networks” © Springer-Verlag Berlin
Heidelberg2009https://link.springer.com/chapter/10.10
07%2F978-3-642-10240-0_7

[5] Eric Peter “A Practical Guide to Honeypots”


https://www.cse.wustl.edu/~jain/cse571-
09/ftp/honey/

You might also like