• DocumentCode
    1938348
  • Title

    Intrusion detection in Honeynets by compression and hashing

  • Author

    Abbasi, Fahim H. ; Harris, R.J.

  • Author_Institution
    Sch. of Eng. & Adv. Technol. (SEAT), Massey Univ., Palmerston North, New Zealand
  • fYear
    2010
  • fDate
    Oct. 31 2010-Nov. 3 2010
  • Firstpage
    96
  • Lastpage
    101
  • Abstract
    This paper proposes the design of a behaviour-based Intrusion Detection System (IDS), adopting Fuzzy hashing and Normalized Compression Distance (NCD) to determine similarity in behavioural profiles of worms and malware. The system runs in parallel with an existing knowledge or misuse-based system like Snort, but augments the intrusion detection capabilities by revealing malicious behaviour or activities within the Honeynet. The system integrates into a Honeynet, where the network-based events will be trapped by the gateway device, while system-based events will be trapped on the Honeypot(s). Results of prototype network system components are also discussed.
  • Keywords
    cryptography; invasive software; Honeypot; Snort; behaviour-based intrusion detection system design; fuzzy hashing; gateway device; honeynets; malware; misuse-based system; network-based events; normalized compression distance; system-based events; worms; Complexity theory; Databases; Grippers; Intrusion detection; Malware; Payloads; Protocols; intrusion detection system (IDS);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Telecommunication Networks and Applications Conference (ATNAC), 2010 Australasian
  • Conference_Location
    Auckland
  • Print_ISBN
    978-1-4244-8173-6
  • Electronic_ISBN
    978-1-4244-8171-2
  • Type

    conf

  • DOI
    10.1109/ATNAC.2010.5680264
  • Filename
    5680264