Towards an architecture for monitoring communications in social networks based on graphs -using honeypot
-
2024-09-25 https://doi.org/10.14419/stgdxw35 -
Intrusion Detection; Intrusion Architecture; Honey Pot-Intrusion Detection Algorithm. -
Abstract
In this paper, we are proposing an architecture for monitoring communications in social networks. The main objective is to establish a sys-tem that can detect possible attempts to intrude communications in a social network environment using honeypots. To do this, we reviewed the various works related to intrusion detection concerning architectures, algorithms and software tools in this area. Concretely, our proposal includes four (4) components that we have presented while defining the role of each of them. We implemented this architecture in a python environment with the associated algorithms: One-Class SVM - FOREST ISOLATION as well as their combination. The results show that our architecture produces a more refined level of intrusion detection by applying combinations of these different algorithms. Anything to ensure that intrusions detected by honeypots would be reliable using our proposal.
-
References
- https://blog.netwrix.fr/2018/11/21/les-10-meilleurs-outil-logiciels-de-surveillance-de-windows-server/.
- https://www.blesk.ca (accessed 08/04/2024)
- https://netbasequid.com/blog/20-free-social-media-analytics-tools-fr/.(accessed 04/08/2024)
- https://www.zoho.com/fr/social/social-media-monitoring.html. (accessed 04/08/2024)
- https://www.fortinet.com/resources/cyberglossary/what-is-honeypot. .(accessed 08/05/2024)
- Riquet, D. (2015). Discus: A distributed network intrusion detection architecture based on a dedicated language (Doctoral dissertation, University Lille 1-Sciences and Technologies). https://hal.science/tel-01757859/document.
- Bouzayani, H. (2012). Quantitative model for intrusion detection: an IDS-HONEYPOT collaborative architecture (Doctoral dissertation, Université du Québec en Outaouais). https://di.uqo.ca/id/eprint/508/1/Bouzayani_Hatem_2012_m%C3%A9moire.pdf.
- Curran, K., Morrissey, C., Fagan, C., Murphy, C., O'Donnell, B., Fitzpatrick, G., & Condit, S. (2005). Monitoring hacker activity with a Honeynet. International Journal of Network Management , 15 (2), 123-134. https://doi.org/10.1002/nem.549.
- Moore, C. (2016, August). Detecting ransomware with honeypot techniques. In 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 77-81). IEEE. https://doi.org/10.1109/CCC.2016.14.
- Kemppainen, S., & Kovanen, T. (2018). Honeypot utilization for network intrusion detection. Cyber Security: Power and Technology , 249-270. https://doi.org/10.1007/978-3-319-75307-2_15.
- Lee, S., Abdullah, A., & Jhanjhi, NZ (2020). A review on honeypot-based botnet detection models for smart factories. International Journal of Advanced Computer Science and Applications , 11 (6). https://doi.org/10.14569/IJACSA.2020.0110654.
- Pierrot, D., Harbi, N., & Darmont, J. (2018, May). Intrusion detection and decision support. In 12th Conference on Advances in Deci-sion Systems (ASD 2018) . ACM. https://hal.science/hal-01761914/document.
- https://www.ripublication.com/irph/ijict_spl/ijictv3n10_02.spl.pdf (accessed 05/08/2024)
- https://www.honeyd.org/. (accessed 05/08/2024)
- Tiv, M., Gullifer, J.W., Feng, R.Y., & Titone, D. (2020). Using network science to map what Montréal bilinguals talk about across lan-guages and communicative contexts. Journal of Neurolinguistics , 56 , 100913. https://doi.org/10.1016/j.jneuroling.2020.100913.
- Nguyen, T. Q. (2023). Unsupervised machine learning for the detection of illegitimate traffic (Doctoral dissertation, Paul Sabatier-Toulouse III University).
- Meriem, K., & Cérine-Maroua, B. An Improved K-means Clustering Algorithm.
- Jabiri, F. (2020). Applications of unsupervised classification methods to anomaly detection.
- Elmahalawy, A.M., Mousa, H., & Amin, K. (2022). A Comparative Study for Outlier Detection Strategies Based On Traditional Ma-chine Learning For IoT Data Analysis. IJCI. International Journal of Computers and Information , 9 (1), 60-73.
- Barbariol, T. (2023). Improving Anomaly Detection for Industrial Applications.
-
Downloads
-
How to Cite
koffi, kanga, Béman Hamidja , K. ., Aguie Pacôme Bertrand , B. ., Olivier , A. ., & Souleymane , O. . (2024). Towards an architecture for monitoring communications in social networks based on graphs -using honeypot. International Journal of Basic and Applied Sciences, 13(2), 38-42. https://doi.org/10.14419/stgdxw35