We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment

by Aye Aye Thu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 4
Year of Publication: 2013
Authors: Aye Aye Thu
10.5120/11382-6660

Aye Aye Thu . Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications. 67, 4 ( April 2013), 9-13. DOI=10.5120/11382-6660

@article{ 10.5120/11382-6660,
author = { Aye Aye Thu },
title = { Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number4/11382-6660/ },
doi = { 10.5120/11382-6660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:45.814716+05:30
%A Aye Aye Thu
%T Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 4
%P 9-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, many public sectors lead their services to cloud to perform the various tasks. It is creates their computing process available more easily to users. However, it is also together brings new security attacks and challenges about safety and reliability. The propose system plan to deploy a Honeypot in the IDPS architecture to ensure improve performance, it is desire to increase the level of security in the Cloud computing environment and decrease the threats to Cloud environments through concentrating on the problem of how data are stored in the Cloud. The propose system is effective and efficient model term as the integrated Intrusion Detection and Prevention System (IDPS) and Honeypot that can be used to guard an organization. In this system also integrates two methods namely, Anomaly Detection (AD) and Signature Detection (SD) that can do in cooperation to detect various attacks and deny them through the ability of IPS. The goal of this paper is to detect internal attackers by Honeypot.

References
  1. D. Esesve http://www. oocities. org/dresesve/honeypots. pdf
  2. E-Banking-AppendixB: Glossary, http://www. ffiec. gov/ffiecinfobase/booklets/e_banking/ebanking_appx_b_glossary. html, Accessed on:23/02/2012
  3. H. Kozushko, 'Intrusion detection: Host-Based and Network-Based Intrusion Detection Systems" Independent Study, September 2003.
  4. Http://en. wikipedia. org/wiki/Cloud_computing
  5. Information Technology at Johns Hopkins http://www. it. jhmi. edu/glossary/ghi. html Accessed on:23/02/2012
  6. J. B. Raven Alder,Adam Doxtater, James Foster, Toby Kohlenberg, & Micheal Rash, "Snort2. 1 Intrusion Detection, " 2nd ed. Roackland, MA: Syngress ( Distributed by O'Reilly and Associates), 2004.
  7. J. Mchugh, A. Christie, and J. Allen, "Defending Yourself: The Role of Intrusion Detection Systems" , IEEEF software, Volume 17,Issue 5,Sep-Oct. , pp. 42-51, 2000.
  8. J. Weng and G. Qin, "Network Intrusion Prevention Systems", JTB-Journal of Technology and Business, pp. 37-49, October 2007.
  9. K. V. S. N. R. Rao, A. Pal, and M. R. Patra, " A Service Oriented Architectural Design for Building Intrusion Detection Systems", International Journal of Recent Trends in Engineering, vol. 1,no. 2,pp. 11-14,2009.
  10. Lanc. Spitzner, http://www. tracking-hackers. com
  11. M. Jensen, N. Gruschka, L. L. Iaconom and G. Horst, "On Technical Securtiy Issues in Cloud Computing", 2009 IEEE International Conference on Cloud Computing,pp. 109-116,2009.
  12. U. Thaker, "HoneyAnalyzer – Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot", the second International Conference on Innovations Information Technology, Dubai, UAE September 26-28-2005.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Cloud Computing Cloud IDPS Honeypot AD SD HIDS NIDS