2020 10th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2020
DOI: 10.1109/confluence47617.2020.9057961
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Prevention using Honeypot Network for Cloud Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(7 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Because the centralized server is connected to many ids. As presented in [19], A Honeypot detection was presented as a method of caring data and resources in a cloud over Honeypot by applying it over an infrastructure application (Cloud Environment). Honeypot is a detection and security device which is required to be tested, assaulted, or bargained.…”
Section: Related Workmentioning
confidence: 99%
“…Because the centralized server is connected to many ids. As presented in [19], A Honeypot detection was presented as a method of caring data and resources in a cloud over Honeypot by applying it over an infrastructure application (Cloud Environment). Honeypot is a detection and security device which is required to be tested, assaulted, or bargained.…”
Section: Related Workmentioning
confidence: 99%
“…Low-interaction Honeypots [25] are limited to the degree of emulation offered by the honeypot; hence, the interaction between the attacker and honeypot system is low. ese honeypots offer few privileges to the intruder who will have a limited scope.…”
Section: Honeypotmentioning
confidence: 99%
“…These methods effectively improved the situation and significantly increased the difficulty and cost for attackers to launch their attacks. However, they still have limitations: honeypot technology requires a significant amount of prior knowledge from attackers [8], and MTD possesses time sensitivity and uncontrollability, and the high-frequency variability, particularly, leads to a decline in system performance [7].…”
Section: Introductionmentioning
confidence: 99%