Open Access Open Access  Restricted Access Subscription Access

A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems


Affiliations
1 Firat University, Software Engineering Department, 23119, Elazig, Turkey
 

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot systems are proposed as complementary structures. This paper presents the overall view of the publications in IDS, IPS and honeypot systems. Recently, honeypot systems are anymore used in connection with intrusion detection systems. So this paper describes possible implementation of honeypot technologies combined with IDS/IPS in a network. Studies in the literature have shown intrusion detection systems cannot find the 0-day vulnerabilities. The system provided by the honeypots and intrusion detection systems in the network, might detect new exploit and hacker attempt.

Keywords

Information Security, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Honeypot, Network Security.
User
Notifications
Font Size

Abstract Views: 338

PDF Views: 0




  • A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems

Abstract Views: 338  |  PDF Views: 0

Authors

Muhammet Baykara
Firat University, Software Engineering Department, 23119, Elazig, Turkey
Resul Das
Firat University, Software Engineering Department, 23119, Elazig, Turkey

Abstract


Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot systems are proposed as complementary structures. This paper presents the overall view of the publications in IDS, IPS and honeypot systems. Recently, honeypot systems are anymore used in connection with intrusion detection systems. So this paper describes possible implementation of honeypot technologies combined with IDS/IPS in a network. Studies in the literature have shown intrusion detection systems cannot find the 0-day vulnerabilities. The system provided by the honeypots and intrusion detection systems in the network, might detect new exploit and hacker attempt.

Keywords


Information Security, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Honeypot, Network Security.