Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

被引:29
|
作者
Sibi Chakkaravarthy, S. [1 ]
Sangeetha, D. [2 ,3 ,4 ]
Cruz, Meenalosini Vimal [2 ,3 ,4 ]
Vaidehi, V. [2 ,3 ,4 ]
Raman, Balasubramanian [5 ]
机构
[1] VIT AP Univ, Sch Comp Sci & Engn SCOPE, Amaravati 522237, India
[2] Anna Univ, Madras Inst Technol, Chennai 600044, Tamil Nadu, India
[3] USNH, Keene State Coll, Keene, NH 03435 USA
[4] Mother Teresa Womens Univ, Kodaikanal 624101, India
[5] Indian Inst Technol Roorkee, Roorkee 247667, Uttar Pradesh, India
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Ransomware; Intrusion detection; Computer hacking; Encryption; Complex event processing; CEP; Honeypot; Honeyfolder; SoLA; intrusion detection Honeypot; ransomware; SYSTEM;
D O I
10.1109/ACCESS.2020.3023764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-virus (AV) as a single monitoring agent is complicated and time-consuming, thus fails in ransomware detection. A robust Intrusion Detection Honeypot (IDH) is proposed to address the issues mentioned above. IDH consists of i) Honeyfolder, ii) Audit Watch, and iii) Complex Event Processing (CEP). Honeyfolder is a decoy folder modeled using Social Leopard Algorithm (SoLA), especially for getting attacked and acting as an early warning system to alert the user during the suspicious file activities. AuditWatch is an Entropy module that verifies the entropy of the files and folders. CEP engine is used to aggregate data from different security systems to confirm the ransomware behavior, attack pattern, and promptly respond to them. The proposed IDH is experimentally tested in a secured testbed using more than 20 variants of recent ransomware of all types. The experimental result confirms that the proposed IDH significantly improves the ransomware detection time, rate, and accuracy compared with the existing state of the art ransomware detection model.
引用
收藏
页码:169944 / 169956
页数:13
相关论文
共 50 条
  • [1] Intrusion Detection for MANET to Detect Unknown Attacks Using Genetic Algorithm
    Lalli, M.
    Palanisamy, V.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 976 - 980
  • [2] A dynamic honeypot design for intrusion detection
    Kuwatly, I
    Sraj, M
    Al Masri, Z
    Artail, H
    [J]. IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 95 - 104
  • [3] Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
    Ambili, K. N.
    Jose, Jimmy
    [J]. INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 631 - 638
  • [4] A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
    Kumar, Randhir
    Kumar, Prabhat
    Tripathi, Rakesh
    Gupta, Govind P.
    Garg, Sahil
    Hassan, Mohammad Mehedi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 164 : 55 - 68
  • [5] Intrusion Detection System for IOT Botnet Attacks Using Deep Learning
    Jithu P.
    Shareena J.
    Ramdas A.
    Haripriya A.P.
    [J]. SN Computer Science, 2021, 2 (3)
  • [6] A method to detect network attacks using entropy in the intrusion detection system
    Xia, Qin
    Wang, Zhiwen
    Lu, Ke
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (02): : 14 - 19
  • [7] Using Global Honeypot Networks to Detect Targeted ICS Attacks
    Dodson, Michael
    Vingaard, Mikael
    Beresford, Alastair R.
    [J]. 2020 12TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): 20/20 VISION - THE NEXT DECADE, 2020, : 275 - 291
  • [8] A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks
    Jeyaselvi, M.
    Dhanaraj, Rajesh Kumar
    Sathya, M.
    Memon, Fida Hussain
    Krishnasamy, Lalitha
    Dev, Kapal
    Ziyue, Wang
    Qureshi, Nawab Muhammad Faseeh
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 559 - 574
  • [9] A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks
    M. Jeyaselvi
    Rajesh Kumar Dhanaraj
    M. Sathya
    Fida Hussain Memon
    Lalitha Krishnasamy
    Kapal Dev
    Wang Ziyue
    Nawab Muhammad Faseeh Qureshi
    [J]. Cluster Computing, 2023, 26 : 559 - 574
  • [10] Game Theory based Modified Naive-bayes Algorithm to detect DoS attacks using Honeypot
    Shrivastava, Rajesh Kumar
    Ramakrishna, Saradhi
    Hota, Chittaranjan
    [J]. 2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,