University of Bahrain
Scientific Journals

Exploring Honeypot as a Deception and Trigger Mechanism for Real-Time Attack Detection in Software-Defined Networking

Show simple item record

dc.contributor.author Yousif Khalid, Harman
dc.contributor.author Badie Aldabagh, Najla
dc.date.accessioned 2024-04-03T14:32:45Z
dc.date.available 2024-04-03T14:32:45Z
dc.date.issued 2024-04-02
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5558
dc.description.abstract Cyberattacks are becoming more frequent and sophisticated, making their detection harder. Probe attacks in Software Defined Networking (SDN) not given much attention by the research community, which represents the starting phase for other attacks. The attacker scans the network to get the necessary details about hosts and services running in network to launch successful attacks exploiting vulnerabilities in the system. The issue with probe attacks is that they occur passively and the target system is not aware of them. On one hand, additional mechanism is required to check the network traffic continuously by embedding switches with independent agents, which is against the OpenFlow standard. On the other hand, using statistics provided by OpenFlow switches to the controller, which overloads the controller with the extra task of continuously checking traffic statistics. In this work, a lightweight detection mechanism proposed that detects probe attacks in real-time using machine learning. Honeypot integrated into the detection mechanism to detect passive probe attacks by luring attackers through proving fake services and serving as a trigger mechanism that activates the detection mechanism when necessary. The experimental results show that the proposed mechanism successfully detects probe attacks in real-time achieving accuracy (94.73%) with the minimum CPU load. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Intrusion Detection System (IDS), Software Defined Networking (SDN), Probe, Reconnaissance, Honeypot, Machine learning (ML). en_US
dc.title Exploring Honeypot as a Deception and Trigger Mechanism for Real-Time Attack Detection in Software-Defined Networking en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/160169
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 951 en_US
dc.pageend 960 en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authoraffiliation Department of Computer Science, College of Science, University of Duhok en_US
dc.contributor.authoraffiliation Department of Computer Science, College of Computer Science and Mathematics, University of Mosul en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account