| 
 Proceedings of International Conference on Applied Innovation in IT
 2025/07/26, Volume 13, Issue 3, pp.165-172
 
 Advanced Network Security System: Honeypot-Based Intrusion Detection with Machine Learning and Visualization
 Ashwini Lakshmipathy, Muthupandi Gurusamy, Siti Fatmawati Lalo, Nonia Sakka Lebang, Karthikeyan Selvaraj and Aws A. AbdulsahibAbstract: This paper focuses on developing a proactive approach to network intrusion detection through integration of honeypots with machine learning for improved security in complex network system. The system utilizes honeypots to capture attackers whereby the honeypots capture real-time traffic details which the system maps and analyzes packet content related to protocols. Blending with machine learning, the detection model analyzes the accurate data to detect known as well as unknown forms of cyber threats. There is a new feature called Visualization Dashboard that gives analytics and reports to network administrators. It provides information about honeypot engagements, traffic, and intrusion detected empowering the monitoring and management process. Incorporating the proactive defense measures into the proposed system eliminates the weakness of the conventional intrusion detection approach in managing new forms of cyber threats. The honeypots are designed to contain the attackers and simultaneously acquiring useful information about the intrusive activities. The effectiveness is enhanced by the ability of the Machine Learning model in enhancing the detection rates besides the flexibility in accommodating new techniques of detection of attacks. The Visualization Dashboard improves usability since it contains an easily navigable interface for current security monitoring and past performance examination. This approach guarantees the entirety of network protection by integrating the effectiveness of the deception-based honeypot systems and the machine learning approach based on big data. The paper reveals that the system is capable of enhancing detection rates, reducing false positives and providing valuable information regarding the network status to administrators. Thus, the provided system is considered ideal for contemporary cybersecurity issues. Advanced technologies combined in this system offer a flexible and expandable system to protect networks from the steadily growing number of threats.
 
 Keywords: Honeypots, Intrusion Detection Systems (IDS), Machine Learning in Cybersecurity, Network Security Visualization, Anomaly Detection.
 
 DOI: Under Indexing
 
 Download: PDF
 
 
 References:
I. M. M. Matin and B. Rahardjo, "Malware detection using honeypot and machine learning," IEEE, vol. 7, pp. 1-4, 2019.
R. Vishwakarma and A. K. Jain, "A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks," IEEE, pp. 1019-1024, 2019.
K. Jiang and H. Zheng, "Design and implementation of a machine learning enhanced web honeypot system," IEEE, pp. 957-961, 2020.
H. N. Abosaooda, S. B. Ariffin, O. M. Alyasiri, and A. A. Noor, "Evaluating the Effectiveness of AI Tools in Mathematical Modelling of Various Life Phenomena: A Proposed Approach," IJDS, vol. 2, no. 1, pp. 16-25, Jan. 2025.
K. Hara and T. Takahashi, "Machine-learning approach using solidity bytecode for smart-contract honeypot detection in the ethereum," IEEE, pp. 652-659, 2021.
M. R. Siddique et al., "Integrating Machine Learning-Powered Smart Agents into Cyber Honeypots: Enhancing Security Frameworks," in Proc. IEEE 9th International Conference for Convergence in Technology (I2CT), 2024, pp. 1-7.
A. F. Garap, "A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data," 2017, [Online]. Available: https://arxiv.org/abs/1709.03082.
S. Kandanaarachchi, H. Ochiai, and A. Rao, "Honeyboost: Boosting honeypot performance with data fusion and anomaly detection," 2021, [Online]. Available: https://arxiv.org/abs/2105.02526.
D. Fraunholz, M. Zimmermann, and H. D. Schotten, "An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy," 2021, [Online]. Available: https://arxiv.org/abs/2111.03884.
M. Di Mauro, G. Galatro, G. Fortino, and A. Liotta, "Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review," 2021, [Online]. Available: https://arxiv.org/abs/2104.04958.
M. Esmaeili et al., "Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security," 2024, [Online]. Available: https://arxiv.org/abs/2410.01016.
G. Sarkar, H. Singh, S. Kumar, and S. K. Shukla, "Tactics, techniques and procedures of cybercrime: A methodology and tool for cybercrime investigation process," in ACM International Conference Proceeding Series, 2023, [Online]. Available: https://doi.org/10.1145/3600160.3605013.
S. A. Raghul, G. Gayathri, R. Bhatt, and K. A. V. Kumar, "Enhancing cybersecurity resilience: Integrating IDS with advanced honeypot environments for proactive threat detection," in Proc. 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), 2024, pp. 1363-1368, [Online]. Available: https://doi.org/10.1109/ICAAIC60222.2024.10575865.
H. J. Alhamdane and M. Nickray, "Enhancing the Efficiency of Routing Strategies in WSNs Using Live Streaming Algorithms," Journal of Technology, vol. 6, no. 4, pp. 27-39, Dec. 2024.
P. T. Duy et al., "Investigating on the robustness of flow-based intrusion detection system against adversarial samples using generative adversarial networks," Journal of Information Security and Applications, vol. 74, p. 103472, 2023, [Online]. Available: https://doi.org/10.1016/j.jisa.2023.103472.
G. Agrawal, A. Kaur, and S. Myneni, "A review of generative models in generating synthetic attack data for cybersecurity," Electronics, vol. 13, no. 2, p. 322, 2024, [Online]. Available: https://doi.org/10.3390/electronics13020322.
M. Mittal, K. Kumar, and S. Behal, "Deep learning approaches for detecting DDoS attacks: a systematic review," Soft Computing, vol. 27, pp. 13039-13075, 2023, [Online]. Available: https://doi.org/10.1007/s00500-021-06608-1.
A. I. Jony and A. K. B. Arnob, "A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset," Journal of Edge Computing, vol. 3, pp. 28-42, 2024, [Online]. Available: https://doi.org/10.55056/jec.648.
N. J. Singh, N. Hoque, K. R. Singh, and D. K. Bhattacharyya, "Botnet-based IoT network traffic analysis using deep learning," Security and Privacy, vol. 7, p. 355, 2024, [Online]. Available: https://doi.org/10.1002/SPY2.355.
M. Aljebreen et al., "Enhancing DDoS attack detection using snake optimizer with ensemble learning on Internet of Things environment," IEEE Access, vol. 11, pp. 104745-104753, 2023, [Online]. Available: https://doi.org/10.1109/ACCESS.2023.3318316.
 |  
	
		|  
  
			    HOME 
			- Conference - Journal
 - Paper Submission to Journal
 - Paper Submission to Conference
 - For Authors
 - For Reviewers
 - Important Dates
 - Conference Committee
 - Editorial Board
 - Reviewers
 - Last Proceedings
 
			-
            Volume 13, Issue 3 (ICAIIT 2025) PROCEEDINGS
 -
            Volume 13, Issue 2 (ICAIIT 2025)
 -
            Volume 13, Issue 1 (ICAIIT 2025)
 -
            Volume 12, Issue 2 (ICAIIT 2024)
 -
            Volume 12, Issue 1 (ICAIIT 2024)
 -
            Volume 11, Issue 2 (ICAIIT 2023)
 -
            Volume 11, Issue 1 (ICAIIT 2023)
 -
            Volume 10, Issue 1 (ICAIIT 2022)
 -
            Volume 9, Issue 1 (ICAIIT 2021)
 -
            Volume 8, Issue 1 (ICAIIT 2020)
 -
            Volume 7, Issue 1 (ICAIIT 2019)
 -
            Volume 7, Issue 2 (ICAIIT 2019)
 -
            Volume 6, Issue 1 (ICAIIT 2018)
 -
            Volume 5, Issue 1 (ICAIIT 2017)
 -
            Volume 4, Issue 1 (ICAIIT 2016)
 -
			Volume 3, Issue 1 (ICAIIT 2015)
 -
			Volume 2, Issue 1 (ICAIIT 2014)
 -
			Volume 1, Issue 1 (ICAIIT 2013)
 
			ICAIIT 2025 PAST CONFERENCES
 -
			Photos
 -
			Reports
 
 ICAIIT 2024
 -
			Photos
 -
			Reports
 
 ICAIIT 2023
 -
			Photos
 -
			Reports
 
 ICAIIT 2021
 -
			Photos
 -
			Reports
 
 ICAIIT 2020
 -
			Photos
 -
			Reports
 
 ICAIIT 2019
 -
			Photos
 -
			Reports
 
 ICAIIT 2018
 -
			Photos
 -
			Reports
   
			    ETHICS IN PUBLICATIONS
 ACCOMODATION
   
			    CONTACT US   |  |