955 Hits in 3.6 sec

Cloud security using self-acting spontaneous honeypots

Nooreen Fatima Khan, M Mohan
2018 International Journal of Engineering & Technology  
Also, the concept that how the instances of this honey pot can be made available as a service to the customer and how this SAS HP can be deployed with in cloud is given in this report.  ...  The aim is to develop the working prototype of the proposed system in cloud environment.  ...  Gerard Wagner et al in , " Adaptive and Self Configurable Honey pot", made initiatory effort to build a honeypot which is adaptive in nature .  ... 
doi:10.14419/ijet.v7i2.8.10418 fatcat:plh7wpnkl5effgwaydi52ub6wm

An Extensive Study of Honeypot Technique

Ahood h. Althobaiti
2019 International Journal of Advanced Trends in Computer Science and Engineering  
We likewise give suggestions to future honeypot programming which is progressively versatile, secluded and consolidate a dynamic insight structure.  ...  Honeypots have been utilized broadly for more than two decades. Notwithstanding, their improvement is infrequently went with a comprehension of how assailants can distinguish them.  ...  A cloud user may want to detect intruder's technique to intrude and may want to determine vulnerabilities in the real system.  ... 
doi:10.30534/ijatcse/2019/103862019 fatcat:drqkarnhi5djrnbj4stghmlomq

A First Step Towards Understanding Real-world Attacks on IoT Devices [article]

Armin Ziaie Tabari, Xinming Ou
2020 arXiv   pre-print
We deployed honeypots both on-premise and in the cloud, with associated analysis and vetting infrastructures to ensure these honeypots cannot be easily identified as such and appear to be real systems.  ...  A primary condition for a honeypot to yield useful insights is to let attackers believe they are real systems used by humans and organizations.  ...  We both adapt existing off-the-shelf honeypot systems and build ones from scratch to create a variety of honeypot systems for attackers to target. 2.  ... 
arXiv:2003.01218v1 fatcat:ey34gwllvngxdnvl7hzjsxdsga

Federated Cloud Security Architecture for Secure and Agile Clouds [chapter]

Weiliang Luo, Li Xu, Zhenxin Zhan, Qingji Zheng, Shouhuai Xu
2013 High Performance Cloud Auditing and Applications  
The federated security architecture consists of a set of seamlessly integrated systematic security mechanisms at the application layer, the network layer and the system layer in federated cloud computing  ...  to other layers for countermeasures; (3) it uses command and control (C2) to coordinate both in-cloud and cross-cloud defense activities via federated cloud security centers.  ...  In particular, we illustrate how to blend honeypots into the IP address space of production cloud systems, which will make it harder for the attackers to identify and bypass the honeypots. • System-Layer  ... 
doi:10.1007/978-1-4614-3296-8_7 fatcat:g6lhiouzavd4bncl7cufiqywrq

Building and Securing Cloud-based Video Curation Service

R. Mangalagowri, Shashank Bhardwaj
2016 Indian Journal of Science and Technology  
A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system  ...  Applications: To secure the service, a dynamic honeypot can be constructed.  ...  Different novel methods -such as a Dynamic honeypot or rate limiting system can be used to secure cloud based application layer services.  ... 
doi:10.17485/ijst/2016/v9i37/102083 fatcat:r2qubxwgerfhfpbsz7y7dukrjy

A Review on the Different Types of Honeypots in Information Security

I Putu Elba Duta Nugraha, Department of Electrical Engineering, Udayana University, Jimbaran, Badung Regency 80361, Indonesia
2021 International Journal of Current Science Research and Review  
Honeypotting has evolved into a crucial tool in information security analysis, despite the fact that the concept of enticing enemies in order to watch their activities is not new.  ...  Honeynets, honeytokens, and adaptive honeypots are examples of recent advancements in network intrusion detection.  ...  It's critical to realize that installing a honeypot will always pose some risk to the network as a whole.  ... 
doi:10.47191/ijcsrr/v4-i12-10 fatcat:ivvrne3h5zgpddg5o4yeyvtz6u

Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward

2021 International Journal of Advanced Trends in Computer Science and Engineering  
This research paper is focused on analyzing the multi-cloud environment, intrusion detection systems and the use of honeypots in the existing solutions to understand the possible configurations for effective  ...  Honeypot is a vibrant mechanism to divert attention of the unknown attackers and able to capture data to analyze the anomaly.  ...  Intercloud as the second layer in cloud computing, by building more dependable cloud services and systems.  ... 
doi:10.30534/ijatcse/2021/1451032021 fatcat:tiqtxdmwwjeqre6muhz4yczu2i

SSH Honeypot: Building, Deploying and Analysis

Harry Doubleday, Leandros Maglaras, Helge Janicke
2016 International Journal of Advanced Computer Science and Applications  
The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it.  ...  Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features.  ...  Authors in [5] describe these as truly vulnerable systems that can be probed, attacked and exploited, once the attacker gains access to the system the honeypot can be used in a botnet or to carry out  ... 
doi:10.14569/ijacsa.2016.070518 fatcat:6wlpmic2nvbi3ickcv54z5trv4

Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb

Chaimae Saadi, Habiba Chaoui
2016 Procedia Computer Science  
the added value of Honeypot and IDS based mobile agents, solve systems limitations intrusion detection, improve knowledge bases IDS thus increase the detection rate in our cloud environment.  ...  This work proposes new cloud infrastructure architecture, which combines IDS based on mobile agent sand using three types of honeypots in order to detect attacks, to study the behavior of attackers, increase  ...  The aim of [8] [9] is to explain how honeypots are used for securing cloud computing systems, their advantages and disadvantages but, regrettably, no results approved.  ... 
doi:10.1016/j.procs.2016.05.189 fatcat:l4lc6tfghjc5nml636w5xk2tuu

Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices

Kuan-Chu Lu, I-Hsien Liu, Jia-Wei Liao, Shao-Chun Wu, Zong-Chao Liu, Jung-Shian Li, Chu-Fen Li
2019 Journal of Robotics, Networking and Artificial Life (JRNAL)  
In this study, we explore how to build and evaluate Arduino and Raspberry Pi were used as real-world programmable logic controllers and camouflaged honeypots to simulate the honeymap of the industrial  ...  Industrial control systems honeymap honeypot A B S T R A C T Under the trend of intelligent industrial control systems, it is very important to prevent network hackers from invading the system to attack  ...  Jia-Wei Liao He is a B.S. student in the Department of Electrical Engineering, National Cheng Kung University, Taiwan. He was born in Taichung, Taiwan, in 1997.  ... 
doi:10.2991/jrnal.k.191202.008 fatcat:2epkqjtvdzeolonmg7tpbxne3u

Protocol Deployment for Employing Honeypot-as-a-Service [chapter]

Alexandros Kostopoulos, Ioannis P. Chochliouros, Constantinos Patsakis, Miltos Anastasiadis, Alessandro Guarino
2020 IFIP Advances in Information and Communication Technology  
The YAKSHA project aims at reinforcing EU-ASEAN cooperation and building partnerships in cybersecurity domain by developing a solution tailored to specific national needs leveraging EU know-how and local  ...  In this paper, we consider the protocol deployment process for employing honeypot-as-a-service, with focus on the Internet of Things (IoT) use case.  ...  The paper has been based on the context of the "YAKSHA" ("Cybersecurity Awareness and Knowledge Systemic High-level Application") Project, funded by the EC under the Grant Agreement (GA) No. 780498.  ... 
doi:10.1007/978-3-030-49190-1_10 fatcat:gnwjcbbvpjcjlklo6iuw3cldpu

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
to the real systems.  ...  The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health  ...  As future work, we are planning to propose novel honeypot/honeynet systems for IoT and CPS environments that build upon this survey.  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq

Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots

Pietro Ferretti, Marcello Pogliani, Stefano Zanero
2019 Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy - CPS-SPC'19  
, and we analyze the in-the-wild traffic directed through a set of ICS-specific protocols.  ...  To understand the level of interest towards Internet-connected ICS, we deploy a scalable network of low-interaction ICS honeypots based on the popular conpot framework, integrated with an analysis pipeline  ...  ACKNOWLEDGMENTS This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 690972.  ... 
doi:10.1145/3338499.3357361 dblp:conf/ccs/FerrettiPZ19 fatcat:xgdikwwghrajnhsc3h5zhrmcie

What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering [article]

Armin Ziaie Tabari, Xinming Ou, Anoop Singhal
2021 arXiv   pre-print
In this work, by observing real-world attackers' behavior in a low-interaction honeypot ecosystem, we (1) presented a new approach to creating a multi-phased, multi-faceted honeypot ecosystem, which gradually  ...  Furthermore, our data analytics points to the fact that the vast majority of attack activities captured in the honeypots share significant similarity, and can be clustered and grouped to better understand  ...  It actively feasible to build one honeypot system.  ... 
arXiv:2112.10974v1 fatcat:nmkcktwpbvagzd43uxpvv5zxui

Securing Internet of Things(IoT) Using HoneyPots

Sai Sudha Gadde, Rama Krishna Srinivas Ganta, ASALG Gopala Gupta, Raghava Rao K, KRR Mohan Rao
2018 International Journal of Engineering & Technology  
Here are how honeypots used to defend IoT devices from being attacked and gather information about the attackers' device.  ...  In today's everlasting technological world, information and data communication create more devices stay connected to the internet.  ...  In this paper, we provide a solution to verify system how KF Sensor honeypot is used to secure IoT application.  ... 
doi:10.14419/ijet.v7i2.7.11075 fatcat:i2uxschqa5b2jf2xnpbqirud4q
« Previous Showing results 1 — 15 out of 955 results