Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure

Abstract : Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Traditional Anomaly Detection based IDS may generate more number of false positives.In this paper, we attempt to amalgamate IDS with Cloud computing. Introducing Honeypot in Cloud IDS design can greatly help in detecting potential attacks with reduced number of false positives. This research work provides an impetus to strengthen network security aspects related to Cloud computing to make it more trustworthy.
Type de document :
Communication dans un congrès
Theo Dimitrakos; Rajat Moona; Dhiren Patel; D. Harrison McKnight. 6th International Conference on Trust Management (TM), May 2012, Surat, India. Springer, IFIP Advances in Information and Communication Technology, AICT-374, pp.84-96, 2012, Trust Management VI. 〈10.1007/978-3-642-29852-3_6〉
Liste complète des métadonnées

Littérature citée [13 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01517647
Contributeur : Hal Ifip <>
Soumis le : mercredi 3 mai 2017 - 14:49:05
Dernière modification le : mercredi 3 mai 2017 - 14:52:08
Document(s) archivé(s) le : vendredi 4 août 2017 - 13:39:40

Fichier

978-3-642-29852-3_6_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Hiren Patel. Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure. Theo Dimitrakos; Rajat Moona; Dhiren Patel; D. Harrison McKnight. 6th International Conference on Trust Management (TM), May 2012, Surat, India. Springer, IFIP Advances in Information and Communication Technology, AICT-374, pp.84-96, 2012, Trust Management VI. 〈10.1007/978-3-642-29852-3_6〉. 〈hal-01517647〉

Partager

Métriques

Consultations de la notice

408

Téléchargements de fichiers

67