HonIDS: Enhancing Honeypot System with Intrusion Detection Models

  • Authors:
  • Yong Tang;HuaPing Hu;XiCheng Lu;Jie Wang

  • Affiliations:
  • National University of Defense Technology, Changsha Hunan, China;National University of Defense Technology, Changsha Hunan, China;National University of Defense Technology, Changsha Hunan, China;National University of Defense Technology, Changsha Hunan, China

  • Venue:
  • IWIA '06 Proceedings of the Fourth IEEE International Workshop on Information Assurance
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Honeypots are highly valued for their detective function. However, suitable detection models using in honeypot system have not been fully explored. We present HonIDS, a honeypot system for detecting malicious hosts and intruders in local network. HonIDS is characterized by its layered structure and is enhanced by two detection models: TFRPP (Times, Frequency, Range, Port risk, average Payload length) model and Bayes model. The basic idea of these models is that although it is hard to directly judge whether one interaction with the honeypots is an attack or malicious activity, it is possible to identify intruders by analyzing the plentiful and global events of honeypots in a given period of time. The TFRPP model gives the honeypot system the ability to assess different risks, by assigning dubiety scores to the hosts who visited honeypots. The Bayes detection model can detect some main types of attacks by classification. The results of our evaluation experiments indicate that TFRPP model and Ba^1yes model are effective and suitable for honeypot system.