Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/545832
Title: | Deeply proficient honeypotdevelopment strategies for detecting denial of service attacks |
Researcher: | Selvakumar V |
Guide(s): | Ruba Soundar K |
Keywords: | Machine Learning Network Intrusion Detection Stacked Auto Encoders |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | Honeypots are the computer network environments that help to newlineprotect the network resources and services from unauthorized network newlineaccesses from the intruders. Honeypot establishes a system environment newlinewhich looks like legitimate environment to attract the external attackers newlineand attack the network and their services. By this way, honeypot systems newlinedetect various attacker activities and their motives. This practice is newlinemainly employs to detect the vulnerable security points of entire network. newlineConsequently, the security principles are implemented to resolve the newlinenetwork security failures in future. Particularly, this research work creates newlinevarious honeypot development strategies using Machine Learning (ML) newlineand Deep Learning (DL) techniques. The intelligent honeypot systems newlineare configured to analyze effective real time attacks injected in to the newlinenetworks. Notably, the proposed research work deals with the variants of newlinecrucial Denial of Service (Dos) attacks. For developing intelligent newlinehoneypot systems, the proposed research work proposes three different newlinetypes of honeypot development strategies. Each strategy is implemented newlineusing highly adaptive honeypot services to detect Dos attacks. In newlineaddition, this research work compares the performance of proposed newlinehoneypot strategies with various existing techniques. In first strategy, newlineReinforcement Learning (RL) techniques are used with DL procedures. newlineThe Deep RL (DRL) procedures are used for implementing Network newlineIntrusion Detection (NIDS) by using IDS agents. The configured IDS newlineagents are implemented to build enterprise honeypot systems for newlinedetecting Dos attacks at run time. The second approach is implemented newlinefor enabling Generative Adversarial Networks (GAN) based honeypot newlineprinciples. newline |
Pagination: | xiii,137p. |
URI: | http://hdl.handle.net/10603/545832 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 170.65 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.08 MB | Adobe PDF | View/Open | |
03_contents.pdf | 372.68 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 349.68 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 713.69 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 582.42 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 1.31 MB | Adobe PDF | View/Open | |
08_chapter4.pdf | 1.44 MB | Adobe PDF | View/Open | |
09_chapter5.pdf | 1.38 MB | Adobe PDF | View/Open | |
10_chapter6.pdf | 628.46 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 73.3 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 53.36 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: