INTRUSION DETECTION AND PREVENTION USING HONEYPOT NETWORK FOR CLOUD SECURITY

Authors

  • Mohammed Muzammil, Mohammed Mubashir, Mohammed Zahur Uddin B.E Student, Department of CSE, ISL College of Engineering, India. Author

Abstract

With the rapid increase in the number of users, there is a rise in issues related to hardware failure,
web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data.
With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing
practices. With a tremendous development in this technology, there is ever increasing chance of its security
being compromised by malicious users. A way to divert malicious traffic away from systems is by using
Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind
the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the
concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper
discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security,
thereby proposing a new technique to do the same.

Downloads

Published

2024-04-30

Issue

Section

Articles

How to Cite

INTRUSION DETECTION AND PREVENTION USING HONEYPOT NETWORK FOR CLOUD SECURITY. (2024). International Journal of Engineering and Science Research, 14(2), 1483-1500. https://www.ijesr.org/index.php/ijesr/article/view/859