JOURNAL ARTICLE

Intrusion Detection Platform with Virtual Honeypots

Abstract

The usage of internet services and online data transfers is increasing a lot nowadays. Security of network services should be a priority for every network service provider. It is important for any network owner to identify network vulnerabilities, especially if attackers try to access its services. It should detect intruders in a very short time and immediately block their actions in order to minimize the network damages and data loss. We design and simulate an intrusion detection platform based on virtual honeypots and present it in a given scenario. An algorithm with an increased capability of analyzing large volumes of data identifies cybersecurity risks by analyzing log files in order to make a decision regarding the appropriate countermeasures to take.

Keywords:
Honeypot Computer science Computer security Intrusion detection system Damages The Internet Network security Service (business) Order (exchange) Computer network World Wide Web

Metrics

3
Cited By
1.32
FWCI (Field Weighted Citation Impact)
7
Refs
0.69
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Software System Performance and Reliability
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Intrusion Detection Using Honeypots

Neeraj BhagatBhavna Arora

Year: 2018 Pages: 412-417
JOURNAL ARTICLE

Honeypots: Virtual Network Intrusion Monitoring System

Manmohan DagarRashmi Popli

Journal:   International Journal of Scientific Research in Network Security and Communication Year: 2018 Vol: 6 (2)Pages: 45-49
BOOK-CHAPTER

Evading Intrusion Detection Systems, Firewalls, and Honeypots

Ahmed Sheikh

Apress eBooks Year: 2021 Pages: 153-164
JOURNAL ARTICLE

Reactive Security – Intrusion Detection, Honeypots, and Vulnerability Assessment

M. MeierU. FlegelH. König

Journal:   PIK - Praxis der Informationsverarbeitung und Kommunikation Year: 2004 Vol: 27 (4)Pages: 186-187
© 2026 ScienceGate Book Chapters — All rights reserved.