Journal of Theoretical and Applied Information Technology
In the previous paper, the authors presented a distributed intrusion prevention system based on honeypots for collecting malicious data. Among important questions to handle there is the choice of filtering device on which a filtering rule has to be applied. In this paper, they propose a solution which will allow automatic selection of filtering device in the distributed IPMS platform. These devices will be configured to block unauthorized traffic. This solution must ensure full integration with the IPMS architecture.