Cloud Packets Forensics through NIDS and NIPS with Honeypot
DOI:
https://doi.org/10.26438/ijcse/v8i4.119122Keywords:
Intrusion detection system(IDS), intrusion prevention system(IPS), honeypot, anomaly detection(AD), signature detection(SD), firewall, insider threat, PC assault, network assaultAbstract
As of today, almost everyone currently relocating their administrations into the cloud to offer an increasingly adaptable, open, versatile and omnipresent assistance. In any case, this additionally carries more introduction to security dangers, digital assaults and troubles in dependability and wellbeing. The proposed arrangement is to send a Honeypot in the Intrusion Detection and Prevention System (IDPS) model so as to ensure upgraded execution, extended degree of security in the Distributed computing condition and decrease in the threats to the Cloud condition - by concentrating on the issue of how the information is stored in the Cloud. The structure depicted utilizations both Anomaly Detection (AD) and Signature Detection (SD) in coordinated effort, to recognize various assaults and deny them access using the proposed IPS. The goal of this report is to feature, perceive and ensnare inward interlopers by the utilization of the Honeypot
References
[1] G. Aceto, A. Botta, W. de Donato and A. Pescapè, “Cloud Monitoring: definitions, issues and future directions”, 2012 IEEE 1st Int. Conf. on Cloud Networking (CLOUDNET), Paris, France, 2012, pp. 63-67.
[2] A. Malik and M. M. Nazir, “Security Framework for Cloud Computing Environment: A Review”, J. of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 3, March 2012, pp. 390 – 394.
[3] K. Lee, “Security Threats in Cloud Computing Environments”, Int. J. of Security and its Applications, vol. 6, no. 4, Oct. 2012, pp. 25-32.
[4] S. Y. Ho, “Instrusion Detection – Systems for today and tomorrow”.
[5] S. M. Moorthy and M. Rajeswari, “Virtual Host based Intrusion Detection System for Cloud”, Int. J. of Eng. & Tech., Vol. 5, issue 6, Dec 2013/Jan 2014, p. 5024.
[6] H. M. Alsafi, W. M. Abduallah and A. K. Pathan, “IDPs: An Integrated Intrusion Handling Model for Cloud Computing Environment”, March 2012.
[7] C. Modi, D. Patel, B. Borisaniya, A. Patel and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, The J. of Supercomputing, vol. 63, issue 2, pp. 561 – 592.
[8] L. Spitzner, “The Value of Honeypots”, 10th Jan., 2003.
[9] N. F. Huang, C. Wang, I. J. Liao, C. W. Lin and C. N. Kao, “An OpenFlow-based collaborative intrusion prevention system for cloud networking”, 2015 IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, 2015, pp. 85-92, 607 June 2015.
[10] K. Shridhar and N. Gautam, “A Prevention of DDoS Attacks in Cloud Using Honeypot”, Int. J. of Science and Research (IJSR), vol. 3, issue 11, Nov. 2014, pp. 2378 – 2383.
[11] D. Winder, “How to use the cloud as a honeypot”, 2nd Oct., 2014.
[12] V. Sing, A. Kumar and D. Kumar, “An Advanced Hybrid Intrusion Detection System in Cloud Computing Environment”, Int. J. for Research in App. Sci. and Eng. Tech. (IJRASET), vol. 2, issue 6, June 2014, pp. 302 – 309.
[13] Jha, A., Johnson, D., Murari, K., Raju, M., Cherian, V., & Girikumar, Y.. OpenStack Beginner`s Guide (for Ubuntu - Precise). CSS Corp. Pvt. Lt, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
