Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security

被引:0
|
作者
Mahajan, Varun [1 ]
Peddoju, Sateesh K. [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttar Pradesh, India
关键词
Cloud Computing; Network Intrusion Detection System; Signature-based detection; Honeypot Network; OpenStack; SNORT; Malware Analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks.
引用
收藏
页码:829 / 834
页数:6
相关论文
共 50 条
  • [1] Intrusion Detection and Prevention using Honeypot Network for Cloud Security
    Negi, Poorvika Singh
    Garg, Aditya
    Lal, Roshan
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 129 - 132
  • [2] A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud
    Sharma, Sparsh
    Kaul, Ajay
    [J]. VEHICULAR COMMUNICATIONS, 2018, 12 : 138 - 164
  • [3] Network security intrusion target detection system in the cloud
    Srirangam, Durga Prasad
    Salina, Adinarayana
    Bapu, B. R. Tapas
    Partheeban, N.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 602 - 613
  • [4] Enhancing network intrusion detection system with honeypot
    Yeldi, S
    Gupta, S
    Ganacharya, T
    Doshi, S
    Bahirat, D
    Ingle, R
    Roychowdhary, A
    [J]. IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1521 - 1526
  • [5] A review on intrusion detection approaches in cloud security systems
    Singh, Satyapal
    Kubendiran, Mohan
    Sangaiah, Arun Kumar
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (04) : 361 - 374
  • [6] A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
    Artail, Hassan
    Safa, Haidar
    Sraj, Malek
    Kuwatly, Iyad
    Al-Masri, Zaid
    [J]. COMPUTERS & SECURITY, 2006, 25 (04) : 274 - 288
  • [7] Implementation of a Modern Security Systems Honeypot Honey Network on Wireless Networks
    Wafi, Hibatul
    Fiade, Andrew
    Hakiem, Nashrul
    Bahaweres, Rizal Broer
    [J]. 2017 INTERNATIONAL YOUNG ENGINEERS FORUM (YEF-ECE), 2017, : 91 - 96
  • [8] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [9] Optimization of Network Security in University Laboratories Based on Anomaly Intrusion Detection in Public Cloud Networks
    Wang, Man
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [10] Network intrusion detection system based on Honeypot technology
    Zheng, Jun-Jie
    Xiao, Jun-Mo
    Liu, Zhi-Hua
    Wang, Xiao-Lei
    Wang, Hong-Tao
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (02): : 257 - 259