Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/545832
Title: Deeply proficient honeypotdevelopment strategies for detecting denial of service attacks
Researcher: Selvakumar V
Guide(s): Ruba Soundar K
Keywords: Machine Learning
Network Intrusion Detection
Stacked Auto Encoders
University: Anna University
Completed Date: 2023
Abstract: Honeypots are the computer network environments that help to newlineprotect the network resources and services from unauthorized network newlineaccesses from the intruders. Honeypot establishes a system environment newlinewhich looks like legitimate environment to attract the external attackers newlineand attack the network and their services. By this way, honeypot systems newlinedetect various attacker activities and their motives. This practice is newlinemainly employs to detect the vulnerable security points of entire network. newlineConsequently, the security principles are implemented to resolve the newlinenetwork security failures in future. Particularly, this research work creates newlinevarious honeypot development strategies using Machine Learning (ML) newlineand Deep Learning (DL) techniques. The intelligent honeypot systems newlineare configured to analyze effective real time attacks injected in to the newlinenetworks. Notably, the proposed research work deals with the variants of newlinecrucial Denial of Service (Dos) attacks. For developing intelligent newlinehoneypot systems, the proposed research work proposes three different newlinetypes of honeypot development strategies. Each strategy is implemented newlineusing highly adaptive honeypot services to detect Dos attacks. In newlineaddition, this research work compares the performance of proposed newlinehoneypot strategies with various existing techniques. In first strategy, newlineReinforcement Learning (RL) techniques are used with DL procedures. newlineThe Deep RL (DRL) procedures are used for implementing Network newlineIntrusion Detection (NIDS) by using IDS agents. The configured IDS newlineagents are implemented to build enterprise honeypot systems for newlinedetecting Dos attacks at run time. The second approach is implemented newlinefor enabling Generative Adversarial Networks (GAN) based honeypot newlineprinciples. newline
Pagination: xiii,137p.
URI: http://hdl.handle.net/10603/545832
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File170.65 kBAdobe PDFView/Open
02_prelim pages.pdf2.08 MBAdobe PDFView/Open
03_contents.pdf372.68 kBAdobe PDFView/Open
04_abstracts.pdf349.68 kBAdobe PDFView/Open
05_chapter1.pdf713.69 kBAdobe PDFView/Open
06_chapter2.pdf582.42 kBAdobe PDFView/Open
07_chapter3.pdf1.31 MBAdobe PDFView/Open
08_chapter4.pdf1.44 MBAdobe PDFView/Open
09_chapter5.pdf1.38 MBAdobe PDFView/Open
10_chapter6.pdf628.46 kBAdobe PDFView/Open
11_annexures.pdf73.3 kBAdobe PDFView/Open
80_recommendation.pdf53.36 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: