Network Intrusion Detection System Using Honeypot in Cloud Environment
Keywords:
NIDDS, networkHoneypot, vulnerabilities, knowledge, intrusion detection, DDoSAbstract
The issues of cybercrime, allocation of space, site-hosting & loss of data are getting worse every day as the number of internet users rises. Our switch to cloud computing technique resulted in reliable, safe, fast, and cost- effective services. The real advancement in computer technology put malicious people at risk of compromising its security. System security has increased as a result of the adoption of a thorough plan, and harmful traffic has been diverted away from systems. Remember that using Honeypot on servers owned by third-party cloud vendors may present legal issues. One file-sharing programme that is installed on cloud servers makes advantage of the honeypot concept. In this study, we mainly discussed the intrusion detection capabilities of honeypots, and we used many Linux instances.
Downloads
References
P.aS.aNegi,aA. Garg and R. Lal, "IntrusionaDetectionaandaPreventionausing Honeypot Network for Cloud Security,"
10th International Conference onaCloud Computing, Data Science & Engineering (Confluence), 2020, pp.
-132, doi: 10.1109/Confluence47617.2020.9057961.
https://www.techtarget.com/whatis/feature/How-to-build-a-honeypot-to-increase-network-security
Julian Jang-Jaccard,aSurya Nepal,A survey ofaemerging threats in cybersecurity,
Journal of Computer and System Sciences,Volume 80, Issue 5,2014,Pages 973-993,
ISSN 0022-0000, https://doi.org/10.1016/j.jcss.2014.02.005.
J. Rosenberg, Chapter e6 -aEmbedded security, Editor(s): Augusto Vega, Pradip Bose, Alper Buyuktosunoglu,aRugged
Embedded Systems, Morgan Kaufmann,
2017, Pages e1-e74, ISBN 9780128024591, https://doi.org/10.1016/B978-0-12-802459-1.00011-7.
rk%2Dbased%20intrusion%20detection,the%20traffic%20they%20monitor%3B%20Fig.
https://www.sciencedirect.com/science/article/pii/B9780128024591000117)
Sagala,a"Automatic SNORT IDS rule generation based on honeypot log," 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), 2015, pp.a576-580, doi:
10.1109/ICITEED.2015.7409013.
S. Kulkarni, M.aMutalik, P. Kulkarni and T. Gupta, "Honeydoop - a system for on-demand virtual high interaction
honeypots," 2012 International Conference for Internet Technology and SecuredATransactions, 2012, pp. 743-747.
H. Gajjar and Z. Malek, "A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud," 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 162-168, doi:
1109/WorldS450073.2020.9210313.
YogeshaKumar, RajivaMunjal andaHarsh Sharma,”.Comparisonaof Symmetric and
AsymmetricaCryptographyAwithAExisting Vulnerabilitiesaand Countermeasures” IJCSMS International Journal of
Computer Science and ManagementStudies, Vol. 11, Issue 03, Oct 2011.
Mr. GurjeevanaSingh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity
Enhancement In Wireless Intrusion Detection System” InternationalaJournal of Multidisciplinary ResearchVol.1 Issue 4,August 2011.
BhaskarMandal,Tanupriya Choudhury,”aA Key Agreement Scheme for Smart Cards Using Biometrics.”, IEEE InternationalaConference (Published in IEEE) ICCCA. 2016 ,Galgotias University,2016.
D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,“ Performance Evaluation of SymmetricaEncryption Algorithms”, Communications of the IBIMA Volume 8, 2009.
Bhaskar Mandal ,Tanupriya, Choudhury, “AaSecure Biometric Image Encryption Scheme using Chaos and Wavelet Transformations”, International Journal of Advanced Security in Data Analytics and Networks (Special Issue for Recent Advances inACommunications and Networking Technology),2016.
“Honeypots: Catching the Insider Threat”,aavailable at Lance Spitzner Honeypot Technologies Inc.
lance@Honeypots.com.
Karthik Sadasivam,aBanuprasad Samudrala, T. Andrew Yang.A“Design of Network Security Projects using
Honeypots”, University of Houston.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.