International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-7, Issue-4  ( Apr, 2019 )
Past issues
  1. Volume-7, Issue-3  ( Mar, 2019 )
  2. Volume-7, Issue-2  ( Feb, 2019 )
  3. Volume-7, Issue-1  ( Jan, 2019 )
  4. Volume-6, Issue-12  ( Dec, 2018 )
  5. Volume-6, Issue-11  ( Nov, 2018 )
  6. Volume-6, Issue-10  ( Oct, 2018 )
  7. Volume-6, Issue-9  ( Sep, 2018 )
  8. Volume-6, Issue-8  ( Aug, 2018 )
  9. Volume-6, Issue-7  ( Jul, 2018 )
  10. Volume-6, Issue-6  ( Jun, 2018 )

Statistics report
Jun. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 75
Paper Published : 1156
No. of Authors : 2892
  Journal Paper

Paper Title
Implementation Of Port Density Based Dynamic Clustering Algorithm On Honeynet Data

Abstract– Intrusion detection system which are normally deployed in an organization to protect the network are working based on pre-defined rule-sets known as signatures, thereby they will not be able to detect unknown attacks. With the consideration of unknown attack detection, intrusion detection is becoming not useful to detect these kinds of attacks spreading in the network and intrusion detection based attack detection is becoming a very challenging process. Honeynets are enabling us in providing the deep understanding of attacks patterns which are bypassed by the network intrusion detection system. In this paper, considering many problems in current traditional security resource applications and the consideration of the research on Honeynet Technology, We have Implemented port Density Based Dynamic Clustering algorithm on attack data, collected on Honeypots which infer the requirement of placing Honeypots in any organizational network. A categorization of attack data such as Port-wise Distribution, top IP addresses are being presented which is helpful for any system and network administrators to put control list in the network for blocking of those ports and IP addresses. In this research work, the live data set of Honeypot with the port and IP Addresses are analyzed using clustering. The density based clustering approach is implemented after cleaning of the data set. The experimental results shows that we have identified the anomalous traffic targeted a specific port based on clustering.

Author - Brijendra Pal Singh, C. Rama Krishna, Rakesh Sehgal, Sanjeev Kumar

| PDF |
Viewed - 33
| Published on 2014-06-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World