Cloud security using self-acting spontaneous honeypots

  • Authors

    • Nooreen Fatima Khan
    • M Mohan
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10418
  • Cloud, Honey Pot, Prototype, Attack Pattern, -Acting Spontaneous Honey Pot, (SAS HP), Instances.
  • Cloud Computing is growing in terms users, infrastructure, services, also security issues like: Cyber attacks are increasing day by day security community need some better mechanism to learn about attacks and which can provide an improved response against these security issues in cloud effectively. Current defences, security solutions, security equipments doesn’t cover two or all three security concepts which are prevention, detection and response. Honeypot security resource can be used to add value to the cloud security community it can cover all three security concepts if implemented intelligently.In this project a high-interaction based self-acting spontaneous honey pot, abbreviated as SAS HP, which can dynamically change its behavior after learning from an attacker, is proposed and its architecture is given which can be deployed in the cloud environment for the analysis of attack patterns and to secure cloud systems. Also, the concept that how the instances of this honey pot can be made available as a service to the customer and how this SAS HP can be deployed with in cloud is given in this report. The aim is to develop the working prototype of the proposed system in cloud environment.

  • References

    1. [1] https://en.wikipedia.org/wiki/Cloud_computing_security.

      [2] KrešimirPopović, ŽeljkoHocenski ,“ Cloud computing security issues and challenges “, Institute of Automation and Process Computing Faculty of Electrical Engineering Osijek.

      [3] S. Srinivasan, Cloud Computing Basics, SpringerBriefs in Electrical and Computer Engineering, DOI 10.1007/978-1-4614-7699-3_2, © Springer Science+Business Media New York 2014

      [4] https://en.wikipedia.org/wiki/IT_as_a_service

      [5] White paper on IT as a service Handbook : Ten key steps on the journey to ItaaS

      [6] https://www.techopedia.com/definition/24900/storage-as-a-service-saas

      [7] http://searchcloudcomputing.techtarget.com/definition/XaaS-anything-as-a-service

      [8] http://www.computerweekly.com/feature/Pay-as-you-go-computing

      [9] WiraZanoramyAnsiry Zakaria, Miss Laiha Mat Kiah "A review of dynamic and intelligent honeypots." ScienceAsia 39S (2013): 1–5.

      [10] Nithin Chandra S.R, Madhuri T.M, “Cloud Security using Honeypot Systemsâ€, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 1 ISSN 2229-5518.

      [11] Gerard Wagener et al , “Adaptive and Self-Configurable Honeypots†, 12th IFIP/IEEE International Symposium on Integrated Network Management 2011

      [12] GérardWagener et al , “Heliza: talking dirty to the attackersâ€, Received: 18 June 2010 / Accepted: 23 November 2010 © Springer-Verlag France 2010

      [13] Adrian Paunaand IonBica , “RASSH - Reinforced Adaptive SSH Honeypot†, 978-1-4799-2385-4/14 ©2014 IEEE

      [14] Harald Gjermundrød&IoannaDionysiou , “CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructuresâ€, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing.

      [15] European Research Area Specific Programme “European Network of Affined Honey Pots†, NOAH Research Paper.

      [16] M Balamurugan and B Sri Chitra Poornima in “Honeypot as a Service in Cloudâ€, International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications® (IJCA).

      [17] https://en.wikipedia.org/wiki/Kippo

      [18] Mahesh Mudavath, K Hari Kishore, D Venkat Reddy "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.

      [19] T. Padmapriya and V. Saminadan, “Improving Throughput for Downlink Multi user MIMO-LTE Advanced Networks using SINR approximation and Hierarchical CSI feedbackâ€, International Journal of Mobile Design Network and Innovation- Inderscience Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23, May 2015.

      [20] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

      [21] K.Srikar ,M.Akhil ,V.Krishna reddy “Execution of Cloud Scheduling Algorithms†International Innovative Research Journal of Engineering and Technology ISSN NO: 2456-1983.Volume 2, Issue 4 June 2017. 108 -111.

  • Downloads

  • How to Cite

    Fatima Khan, N., & Mohan, M. (2018). Cloud security using self-acting spontaneous honeypots. International Journal of Engineering & Technology, 7(2.8), 243-247. https://doi.org/10.14419/ijet.v7i2.8.10418