DOIONLINE

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-808

Publish In
International Journal of Advance Computational Engineering and Networking (IJACEN)-IJACEN
Journal Home
Volume Issue
Issue
Volume-2,Issue-6  ( Jun, 2014 )
Paper Title
Implementation Of Port Density Based Dynamic Clustering Algorithm On Honeynet Data
Author Name
Brijendra Pal Singh, C. Rama Krishna, Rakesh Sehgal, Sanjeev Kumar
Affilition
M.E. Student, Department of computer science & Engineering, NITTTR Chandigarh, India Associate Professor, Department of Computer Science and Engineering, NITTTR Chandigarh, India Principal, Engineer, Department of Cyber Security Technology Development, CDAC, Mohali, India Sr. Engineer/Scientist C, Department of Cyber Security Technology Development, CDAC, Mohali, India
Pages
76-82
Abstract
Abstract– Intrusion detection system which are normally deployed in an organization to protect the network are working based on pre-defined rule-sets known as signatures, thereby they will not be able to detect unknown attacks. With the consideration of unknown attack detection, intrusion detection is becoming not useful to detect these kinds of attacks spreading in the network and intrusion detection based attack detection is becoming a very challenging process. Honeynets are enabling us in providing the deep understanding of attacks patterns which are bypassed by the network intrusion detection system. In this paper, considering many problems in current traditional security resource applications and the consideration of the research on Honeynet Technology, We have Implemented port Density Based Dynamic Clustering algorithm on attack data, collected on Honeypots which infer the requirement of placing Honeypots in any organizational network. A categorization of attack data such as Port-wise Distribution, top IP addresses are being presented which is helpful for any system and network administrators to put control list in the network for blocking of those ports and IP addresses. In this research work, the live data set of Honeypot with the port and IP Addresses are analyzed using clustering. The density based clustering approach is implemented after cleaning of the data set. The experimental results shows that we have identified the anomalous traffic targeted a specific port based on clustering.
  View Paper