International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-2  ( Feb, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-12  ( Dec, 2023 )
  3. Volume-11,Issue-11  ( Nov, 2023 )
  4. Volume-11,Issue-10  ( Oct, 2023 )
  5. Volume-11,Issue-9  ( Sep, 2023 )
  6. Volume-11,Issue-8  ( Aug, 2023 )
  7. Volume-11,Issue-7  ( Jul, 2023 )
  8. Volume-11,Issue-6  ( Jun, 2023 )
  9. Volume-11,Issue-5  ( May, 2023 )
  10. Volume-11,Issue-4  ( Apr, 2023 )

Statistics report
May. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 134
Paper Published : 1567
No. of Authors : 4088
  Journal Paper

Paper Title :
Implementation Of Port Density Based Dynamic Clustering Algorithm On Honeynet Data

Author :Brijendra Pal Singh, C. Rama Krishna, Rakesh Sehgal, Sanjeev Kumar

Article Citation :Brijendra Pal Singh ,C. Rama Krishna ,Rakesh Sehgal ,Sanjeev Kumar , (2014 ) " Implementation Of Port Density Based Dynamic Clustering Algorithm On Honeynet Data " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 76-82, Volume-2,Issue-6

Abstract : Abstract– Intrusion detection system which are normally deployed in an organization to protect the network are working based on pre-defined rule-sets known as signatures, thereby they will not be able to detect unknown attacks. With the consideration of unknown attack detection, intrusion detection is becoming not useful to detect these kinds of attacks spreading in the network and intrusion detection based attack detection is becoming a very challenging process. Honeynets are enabling us in providing the deep understanding of attacks patterns which are bypassed by the network intrusion detection system. In this paper, considering many problems in current traditional security resource applications and the consideration of the research on Honeynet Technology, We have Implemented port Density Based Dynamic Clustering algorithm on attack data, collected on Honeypots which infer the requirement of placing Honeypots in any organizational network. A categorization of attack data such as Port-wise Distribution, top IP addresses are being presented which is helpful for any system and network administrators to put control list in the network for blocking of those ports and IP addresses. In this research work, the live data set of Honeypot with the port and IP Addresses are analyzed using clustering. The density based clustering approach is implemented after cleaning of the data set. The experimental results shows that we have identified the anomalous traffic targeted a specific port based on clustering.

Type : Research paper

Published : Volume-2,Issue-6


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 40
| Published on 2014-06-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World