2012
DOI: 10.1007/978-3-642-29852-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure

Abstract: Abstract. Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Traditional Anomaly Detection based IDS may generate more number of false positives.In this paper, we attempt to a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The packet preprocessing component processes captured packets and removes redundant information that has low correlation with detection intrusions which are running on VMs. Borisaniya et al (2012) introduced honeypot in cloud IDS design to help in detecting potential attacks with reduced number of false positives. A honeypot is a deception system which allures the attackers (Borisaniya et al 2012).…”
Section: Network Intrusion Detection System (Nids)mentioning
confidence: 99%
See 1 more Smart Citation
“…The packet preprocessing component processes captured packets and removes redundant information that has low correlation with detection intrusions which are running on VMs. Borisaniya et al (2012) introduced honeypot in cloud IDS design to help in detecting potential attacks with reduced number of false positives. A honeypot is a deception system which allures the attackers (Borisaniya et al 2012).…”
Section: Network Intrusion Detection System (Nids)mentioning
confidence: 99%
“…Borisaniya et al (2012) introduced honeypot in cloud IDS design to help in detecting potential attacks with reduced number of false positives. A honeypot is a deception system which allures the attackers (Borisaniya et al 2012). The open source cloud computing framework known as Eucalyptus is being implemented where the incorporation of honeypot with IDS is easy.…”
Section: Network Intrusion Detection System (Nids)mentioning
confidence: 99%
“…Similarly, [34] aims to employ deception concepts in a private cloud using a honeypot. The authors deploy the Snort Network Intrusion Detection System (NIDS) in the Eucalyptus private cloud as a proof of concept implementation.…”
Section: B Related Work 1) Cyber Deceptionmentioning
confidence: 99%
“…Since past various intrusion detection and information security approaches for securing Cloud have been proposed and are in practice [27,[31][32][33][34][35][36][37][38][39][40][41][42], but the concept of network intrusion detection and prevention systems and its deployment strategies over cloud infrastructure, which will be efficient and lightweight, is still going on, because cloud vendors are also interested in a solution that can be deployed and maintained at low cost [5]. Summary of some of the research work carried out in the area of network intrusion detection and prevention in cloud is as follows.…”
Section: The Present Scenariomentioning
confidence: 99%