CFP last date
20 December 2024
Reseach Article

Honeypot as a Service in Cloud

Published on November 2011 by M Balamurugan, B Sri Chitra Poornima
International Conference on Web Services Computing
Foundation of Computer Science USA
ICWSC - Number 1
November 2011
Authors: M Balamurugan, B Sri Chitra Poornima
351157f0-0f5e-4e90-bff2-8f70630f543e

M Balamurugan, B Sri Chitra Poornima . Honeypot as a Service in Cloud. International Conference on Web Services Computing. ICWSC, 1 (November 2011), 39-43.

@article{
author = { M Balamurugan, B Sri Chitra Poornima },
title = { Honeypot as a Service in Cloud },
journal = { International Conference on Web Services Computing },
issue_date = { November 2011 },
volume = { ICWSC },
number = { 1 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 39-43 },
numpages = 5,
url = { /proceedings/icwsc/number1/3975-wsc008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Web Services Computing
%A M Balamurugan
%A B Sri Chitra Poornima
%T Honeypot as a Service in Cloud
%J International Conference on Web Services Computing
%@ 0975-8887
%V ICWSC
%N 1
%P 39-43
%D 2011
%I International Journal of Computer Applications
Abstract

Today’s world is increasingly relying on cloud computing. It is the technology and business of the next generation. The increase in the use of cloud environment is followed by a rising volume of security problems. Most cloud providers support classical security systems to avoid illegal access to the resources. But compromising a resource in a cloud environment is easier for the hackers since all the resources are connected together and monitored using centralized controllers. If a single instance of a resource is vulnerable, compromising it might expose other instances or resources in the cloud. Also, it is impossible to have a completely secure coding. Rather than giving much care to make the code bug-free, it is efficient to implement fake services using Honeypots and set a trap for the hackers. The Honeypot gives us valuable information regarding the intruders. In a cloud environment, running a Honeypot helps to track hackers and secure the real instances of the resources. Also it can be provided as a Service which is an additional business profit in cloud. This architecture is based on a decision and a redirection that automatically filters attacks and saves the details about the attackers. The information about the attackers will help to block them and can be used to take legal actions against them. With Honeypots, we can get statistical information about the attackers and the types of attacks. All the above information about the attackers can be given to those who purchase this service (customers) and allowing them to decide on further actions needed to be taken. Thus providing Honeypot as a Service not only gives cloud providers a better security and an additional business profit but it also secures the customers relying on the cloud providers.

References
  1. Major security issues in cloud URL: “http://en.wikipedia.org/wiki/Cloud_computing_security” Retrieved: August 2011
  2. Security in the Ether, Jan/Feb 2010, Technology Review India, Published by MIT URL: “http://www.technologyreview.in/web/24166/”
  3. Gartner: Seven cloud-computing security risks, July 02, 2008 URL: “http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,0”
  4. Berthier,Robin G. 2009 “Advanced Honeypot Architecture for Network Threats Quantification” University of Maryland, College Park
  5. Eucalyptus Documentation Version 2.0,Eucalyptus Systems URL:“http://open.eucalyptus.com/wiki/IntroducingEucalyptus_v2.0” Retrieved: August 2011
  6. Mohamed Noordin Yusuff, “Honeypots Revealed” URL: “http://www.infosecwriters.com/text_resources/pdf/Honeypots.pdf” Retrieved: September 2011
  7. Remote Host Logging with syslogd,FreeBSD Handbook URL: “http://www.freebsd.org/doc/handbook/network-syslogd.html” Retrieved: September 2011
  8. Running OpenStack under VirtualBox – A Complete Guide , February 17,2011,System Administration and ArchitectureBlog URL: “http://uksysadmin.wordpress.com/2011/02/17/running-openstack-under-virtualbox-a-complete-guide/”
  9. Todd Lammle , “CCNA-Cisco Certified Network Associate Study Guide” ,Second Edition
  10. Loic Etienne/EPFL-SSC “Malicious Traffic Detection in Local Networks with Snort” URL: “http://infoscience.epfl.ch/record/141022/files/pdm.pdf”
  11. Nathalie Weiler,2002 “Honeypots for Distributed Denial of Service Attacks”, Proceedings of Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’O2) 1080-1383/02
  12. Vijay Karamcheti, Davi geiger, Zvi Kedem, S.Muthukrishnan ”Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents”
  13. “Software as a Service Inflection Point: Using Cloud Computing to Achieve Business Agility” Melvin B. Greer Jr ,Published by iUniverse(May13,2009), ISBN-10: 1440141967 ,ISBN-13: 978-1440141966.
Index Terms

Computer Science
Information Sciences

Keywords

Honeypot as a Service (Haas) Honeybug FRE (Filter and Redirection Engine) Honey Controller