Honey pot based new algorithm for data security (original) (raw)

Intrusion Detection and Prevention Using Honeypot Network for Cloud Security

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

The rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security, thereby proposing a new technique to do the same.

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

2015

In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot....

Security from various Intrusion Attacks using Honeypots in Cloud

Cloud Computing means accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Now here in this paper an efficient technique of intrusion detection is proposed using the concept of honeypots. The data to be send by the cloudlets is accessed by the brokers of the cloud where we have implemented some of the rules for the detection of intrusions. The proposed technique implemented here provides less false alarm ratio and provides more accuracy for the detection of intrusions.

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT

KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT, 2019

A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where anything like technology, tool, and the result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. This paper presents the concept of a high-interaction honeypot, Kerberos authentication system as a service in a cloud environment to implement the benefits of, such service to ably distinguish between hackers and users and to provide overall security to the data/network.

Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment

International Journal of Computer Applications, 2013

Nowadays, many public sectors lead their services to cloud to perform the various tasks. It is creates their computing process available more easily to users. However, it is also together brings new security attacks and challenges about safety and reliability. The propose system plan to deploy a Honeypot in the IDPS architecture to ensure improve performance, it is desire to increase the level of security in the Cloud computing environment and decrease the threats to Cloud environments through concentrating on the problem of how data are stored in the Cloud. The propose system is effective and efficient model term as the integrated Intrusion Detection and Prevention System (IDPS) and Honeypot that can be used to guard an organization. In this system also integrates two methods namely, Anomaly Detection (AD) and Signature Detection (SD) that can do in cooperation to detect various attacks and deny them through the ability of IPS. The goal of this paper is to detect internal attackers by Honeypot.

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure

IFIP Advances in Information and Communication Technology, 2012

Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Traditional Anomaly Detection based IDS may generate more number of false positives. In this paper, we attempt to amalgamate IDS with Cloud computing. Introducing Honeypot in Cloud IDS design can greatly help in detecting potential attacks with reduced number of false positives. This research work provides an impetus to strengthen network security aspects related to Cloud computing to make it more trustworthy.

A Prevention of DDos Attacks in Cloud Using Honeypot

Cloud computing is a type of internet based computing where different services – such as server, storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technology. As it relies on sharing computer resources, it is prone to various security risks. One such security issue is Distributed Denial of Services attack on cloud. A DDos attack can originate from anywhere in the network and typically overwhelms the victim server by sending a huge number of packets. This paper deals with the prevention of DDos attacks and how honeypot approach can be used in cloud computing to counter DDos attacks.

A Review on Honeypot Deployment

London Journal Press, 2020

A honeypot is a source which is proposed to be attacked and cooperated to gain more information about the attacker and its used tools. It can also be installed to draw and divert an attacker from their existent targets. The honeypots are planned and placed in a cloud network to gather the strange presence as well as known occurrences happened in cloud computing. Honeypots are a computer software tool designed to help, learn the purpose and methods of the hacker community. Honeypot describes in-depth the concepts of their involvement in the field of security. The present review paper proposes and designs the importance of honeypot deployment technique in the protection of data based on the in-frastructures of honeypot, its advantages and disadvantages. The authors also try to offer possible solutions for issues that are generated while using honeypot.

IJERT-Research on Various Next Generation Honeypot Systems

International Journal of Engineering Research and Technology (IJERT), 2012

https://www.ijert.org/research-on-various-next-generation-honeypot-systems https://www.ijert.org/research/research-on-various-next-generation-honeypot-systems-IJERTV1IS10490.pdf The increasing use of next generation cloud computing in Internet for providing the different services leads us to the security problems. There are many security problems like DoS (Denial of service) attack, hacking intrusions viruses and worms and many more. Since all the resources are connected with each other and monitored centrally by controller in a cloud environment make an easiest way for hackers. If any of a resource is hacked, it may also expose other resources in the cloud. They cannot be eliminated but they can be reduced by using a tracing system Honeypot. Honeypot is used to collect information about hackers. It tries to gain knowledge about attacker's patterns, purposes and motivation for attack. In this paper we will discuss the basic idea of honeypot, different Honeypot systems, and finally the comparison of today's honeypots available.

Big Data Security with Access Control Model and Honeypot in Cloud Computing

International Journal of Computer Applications

Big data typically coins with large volume of data and various enterprises are involving day to day in cloud environment. Nowadays, Cloud facility adoption has enlarged. With the acceptance of cloud facility, numerous of the enterprises are expending to store and process Large Data in cloud. Safety methods provided by the facility providers might not be sufficient to safe the data in the cloud. Enterprise as well as users are suffering with proper security aspect to store, retrieve and process big data in cloud environment. An access control model with honeypot is presented in this paper. Access control model deals with various parameters of authentication, log etc. Various link and areas are included as honeypot to catch hackers or unauthorized users.