Network Intrusion Detection System Using Honeypot in Cloud Environment

Authors

  • Himali Gajjar, Zakiyabanu Malek

Keywords:

NIDDS, networkHoneypot, vulnerabilities, knowledge, intrusion detection, DDoS

Abstract

The issues of cybercrime, allocation of space, site-hosting & loss of data are getting worse every day as the number of internet users rises. Our switch to cloud computing technique resulted in reliable, safe, fast, and cost- effective services. The real advancement in computer technology put malicious people at risk of compromising its security. System security has increased as a result of the adoption of a thorough plan, and harmful traffic has been diverted away from systems. Remember that using Honeypot on servers owned by third-party cloud vendors may present legal issues. One file-sharing programme that is installed on cloud servers makes advantage of the honeypot concept. In this study, we mainly discussed the intrusion detection capabilities of honeypots, and we used many Linux instances.

Downloads

Download data is not yet available.

References

P.aS.aNegi,aA. Garg and R. Lal, "IntrusionaDetectionaandaPreventionausing Honeypot Network for Cloud Security,"

10th International Conference onaCloud Computing, Data Science & Engineering (Confluence), 2020, pp.

-132, doi: 10.1109/Confluence47617.2020.9057961.

https://www.techtarget.com/whatis/feature/How-to-build-a-honeypot-to-increase-network-security

Julian Jang-Jaccard,aSurya Nepal,A survey ofaemerging threats in cybersecurity,

Journal of Computer and System Sciences,Volume 80, Issue 5,2014,Pages 973-993,

ISSN 0022-0000, https://doi.org/10.1016/j.jcss.2014.02.005.

J. Rosenberg, Chapter e6 -aEmbedded security, Editor(s): Augusto Vega, Pradip Bose, Alper Buyuktosunoglu,aRugged

Embedded Systems, Morgan Kaufmann,

2017, Pages e1-e74, ISBN 9780128024591, https://doi.org/10.1016/B978-0-12-802459-1.00011-7.

https://www.sciencedirect.com/topics/computer-science/network-based-intrusion-detection-system#:~:text=A%20netwo

rk%2Dbased%20intrusion%20detection,the%20traffic%20they%20monitor%3B%20Fig.

https://www.sciencedirect.com/science/article/pii/B9780128024591000117)

Sagala,a"Automatic SNORT IDS rule generation based on honeypot log," 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), 2015, pp.a576-580, doi:

10.1109/ICITEED.2015.7409013.

S. Kulkarni, M.aMutalik, P. Kulkarni and T. Gupta, "Honeydoop - a system for on-demand virtual high interaction

honeypots," 2012 International Conference for Internet Technology and SecuredATransactions, 2012, pp. 743-747.

H. Gajjar and Z. Malek, "A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud," 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 162-168, doi:

1109/WorldS450073.2020.9210313.

YogeshaKumar, RajivaMunjal andaHarsh Sharma,”.Comparisonaof Symmetric and

AsymmetricaCryptographyAwithAExisting Vulnerabilitiesaand Countermeasures” IJCSMS International Journal of

Computer Science and ManagementStudies, Vol. 11, Issue 03, Oct 2011.

Mr. GurjeevanaSingh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity

Enhancement In Wireless Intrusion Detection System” InternationalaJournal of Multidisciplinary ResearchVol.1 Issue 4,August 2011.

BhaskarMandal,Tanupriya Choudhury,”aA Key Agreement Scheme for Smart Cards Using Biometrics.”, IEEE InternationalaConference (Published in IEEE) ICCCA. 2016 ,Galgotias University,2016.

D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,“ Performance Evaluation of SymmetricaEncryption Algorithms”, Communications of the IBIMA Volume 8, 2009.

Bhaskar Mandal ,Tanupriya, Choudhury, “AaSecure Biometric Image Encryption Scheme using Chaos and Wavelet Transformations”, International Journal of Advanced Security in Data Analytics and Networks (Special Issue for Recent Advances inACommunications and Networking Technology),2016.

“Honeypots: Catching the Insider Threat”,aavailable at Lance Spitzner Honeypot Technologies Inc.

lance@Honeypots.com.

Karthik Sadasivam,aBanuprasad Samudrala, T. Andrew Yang.A“Design of Network Security Projects using

Honeypots”, University of Houston.

Downloads

Published

24.03.2024

How to Cite

Himali Gajjar. (2024). Network Intrusion Detection System Using Honeypot in Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 3859–3863. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6070

Issue

Section

Research Article