Improving intrusion detection system by honeypot

11
PRESENTED BY BUSHRA MUNIR IMPROVING INTRUSION DETECTION SYSTEM BY HONEYPOT

Transcript of Improving intrusion detection system by honeypot

Page 1: Improving intrusion detection system by honeypot

PRESENTED BY BUSHRA MUNIR

IMPROVING INTRUSION DETECTIONSYSTEM BY HONEYPOT

Page 2: Improving intrusion detection system by honeypot

Why Network Security

System Automation, New technologies

Blackhats

Worms, Trojan, Dos attacks

Page 3: Improving intrusion detection system by honeypot

Intrusion Detection System Monitors network traffic and suspicious activity

Alerts the system or network administrator.

Respond to anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network.

Tracking user policy violation.

Page 4: Improving intrusion detection system by honeypot

IDS Categories

Signature based detection system

Anomaly based detection system

Specification based detection system

Page 5: Improving intrusion detection system by honeypot

Disadvantages

Known threats

False alarm ratio

Logging and analyzing huge amount of data

Processing Loads

Page 6: Improving intrusion detection system by honeypot

New Threats and Attacks

Phishing

Botnets

Trojan and worms

Impersonation

Page 7: Improving intrusion detection system by honeypot

Honeypot A New paradigm of Security

A honeypot is an information system resource whose value lies in unauthorized and illicit use

of that resource

Page 8: Improving intrusion detection system by honeypot

Classification based on Implementation

Server Side Honeypot

Client Side Honeypots

Classification based on Interaction

Low Interactive Honeypots

High Interactive Honeypots

Page 9: Improving intrusion detection system by honeypot

Value of Honeypot

Hybrid Honeypots

Analysis of attacks

Reduction in False Alarm Ratio

Page 10: Improving intrusion detection system by honeypot

Reduction in False Alarm Ratio of IDS using

Honeypot

Proposed model

Page 11: Improving intrusion detection system by honeypot

CONCLUSIONHoneypot is a new paradigm to secure

and provides valuable researches to

prevent threats.