Cloud Packets Forensics through NIDS and NIPS with Honeypot

Authors

  • Bhanushree VK Department of Computer Science and engineering, PES College of Engineering, Mandya, Karnataka, India
  • Minavathi Department of Computer Science and engineering, PES College of Engineering, Mandya, Karnataka, India

DOI:

https://doi.org/10.26438/ijcse/v8i4.119122

Keywords:

Intrusion detection system(IDS), intrusion prevention system(IPS), honeypot, anomaly detection(AD), signature detection(SD), firewall, insider threat, PC assault, network assault

Abstract

As of today, almost everyone currently relocating their administrations into the cloud to offer an increasingly adaptable, open, versatile and omnipresent assistance. In any case, this additionally carries more introduction to security dangers, digital assaults and troubles in dependability and wellbeing. The proposed arrangement is to send a Honeypot in the Intrusion Detection and Prevention System (IDPS) model so as to ensure upgraded execution, extended degree of security in the Distributed computing condition and decrease in the threats to the Cloud condition - by concentrating on the issue of how the information is stored in the Cloud. The structure depicted utilizations both Anomaly Detection (AD) and Signature Detection (SD) in coordinated effort, to recognize various assaults and deny them access using the proposed IPS. The goal of this report is to feature, perceive and ensnare inward interlopers by the utilization of the Honeypot

References

[1] G. Aceto, A. Botta, W. de Donato and A. Pescapè, “Cloud Monitoring: definitions, issues and future directions”, 2012 IEEE 1st Int. Conf. on Cloud Networking (CLOUDNET), Paris, France, 2012, pp. 63-67.

[2] A. Malik and M. M. Nazir, “Security Framework for Cloud Computing Environment: A Review”, J. of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 3, March 2012, pp. 390 – 394.

[3] K. Lee, “Security Threats in Cloud Computing Environments”, Int. J. of Security and its Applications, vol. 6, no. 4, Oct. 2012, pp. 25-32.

[4] S. Y. Ho, “Instrusion Detection – Systems for today and tomorrow”.

[5] S. M. Moorthy and M. Rajeswari, “Virtual Host based Intrusion Detection System for Cloud”, Int. J. of Eng. & Tech., Vol. 5, issue 6, Dec 2013/Jan 2014, p. 5024.

[6] H. M. Alsafi, W. M. Abduallah and A. K. Pathan, “IDPs: An Integrated Intrusion Handling Model for Cloud Computing Environment”, March 2012.

[7] C. Modi, D. Patel, B. Borisaniya, A. Patel and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, The J. of Supercomputing, vol. 63, issue 2, pp. 561 – 592.

[8] L. Spitzner, “The Value of Honeypots”, 10th Jan., 2003.

[9] N. F. Huang, C. Wang, I. J. Liao, C. W. Lin and C. N. Kao, “An OpenFlow-based collaborative intrusion prevention system for cloud networking”, 2015 IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, 2015, pp. 85-92, 607 June 2015.

[10] K. Shridhar and N. Gautam, “A Prevention of DDoS Attacks in Cloud Using Honeypot”, Int. J. of Science and Research (IJSR), vol. 3, issue 11, Nov. 2014, pp. 2378 – 2383.

[11] D. Winder, “How to use the cloud as a honeypot”, 2nd Oct., 2014.

[12] V. Sing, A. Kumar and D. Kumar, “An Advanced Hybrid Intrusion Detection System in Cloud Computing Environment”, Int. J. for Research in App. Sci. and Eng. Tech. (IJRASET), vol. 2, issue 6, June 2014, pp. 302 – 309.

[13] Jha, A., Johnson, D., Murari, K., Raju, M., Cherian, V., & Girikumar, Y.. OpenStack Beginner`s Guide (for Ubuntu - Precise). CSS Corp. Pvt. Lt, 2012.

Downloads

Published

2020-04-30
CITATION
DOI: 10.26438/ijcse/v8i4.119122
Published: 2020-04-30

How to Cite

[1]
B. VK and Minavathi, “Cloud Packets Forensics through NIDS and NIPS with Honeypot”, Int. J. Comp. Sci. Eng., vol. 8, no. 4, pp. 119–122, Apr. 2020.

Issue

Section

Technical Article