International Conference on Web Services Computing |
Foundation of Computer Science USA |
ICWSC - Number 1 |
November 2011 |
Authors: M Balamurugan, B Sri Chitra Poornima |
351157f0-0f5e-4e90-bff2-8f70630f543e |
M Balamurugan, B Sri Chitra Poornima . Honeypot as a Service in Cloud. International Conference on Web Services Computing. ICWSC, 1 (November 2011), 39-43.
Todayâs world is increasingly relying on cloud computing. It is the technology and business of the next generation. The increase in the use of cloud environment is followed by a rising volume of security problems. Most cloud providers support classical security systems to avoid illegal access to the resources. But compromising a resource in a cloud environment is easier for the hackers since all the resources are connected together and monitored using centralized controllers. If a single instance of a resource is vulnerable, compromising it might expose other instances or resources in the cloud. Also, it is impossible to have a completely secure coding. Rather than giving much care to make the code bug-free, it is efficient to implement fake services using Honeypots and set a trap for the hackers. The Honeypot gives us valuable information regarding the intruders. In a cloud environment, running a Honeypot helps to track hackers and secure the real instances of the resources. Also it can be provided as a Service which is an additional business profit in cloud. This architecture is based on a decision and a redirection that automatically filters attacks and saves the details about the attackers. The information about the attackers will help to block them and can be used to take legal actions against them. With Honeypots, we can get statistical information about the attackers and the types of attacks. All the above information about the attackers can be given to those who purchase this service (customers) and allowing them to decide on further actions needed to be taken. Thus providing Honeypot as a Service not only gives cloud providers a better security and an additional business profit but it also secures the customers relying on the cloud providers.