IDS with Honey Pot to Detect Man in Middle Attacks in Cloud Computing

Pasupuleti Satyavathi, Dharmaiah Devarapalli, K. Ganesh Reddy

Abstract


Providing security in cloud computing is challenging issue due to its distributed and multi OS environment. Cloud security mechanisms are deployed at (Virtual Machine Monitor) VMM layer to protect the multi tenant’s privacy and integrity. VMM layer is still vulnerable to Attacks.The main objective of man-in-middle attack is to eavesdrop the user’s privacy and masking their presence making it appear no third party is involving. Due to man-in-middle attack, The VMM gets affected in terms of integrity, confidentiality and availability.  In proposed work, we develop IDS to address the security problems like Man-In-Middle Attack. The Intrusion Detection System is implemented is implemented with Honey pot technology to attract the attacker.The Honey pot intrusion detection system capable of detecting known and unknown attacks along with MITM attack in cloud environment.

Full Text:

PDF

References


Thu, A. A. (2013). Integrated intrusion detection and prevention system with Honey pot on cloud computing environment. International Journal of Computer Applications, 67(4).

Bakshi, A., &Dujodwala, Y. B. (2010, February). Securing cloud from DDOS attacks using intrusion detection system in virtual machine. In 2010 Second International Conference on Communication Software and Networks (pp. 260-264). IEEE.

Marcinkowski, S.J.; Stanton, J.M., “Motivational aspects of information security policies”, IEEE International Conference on Systems, Man and Cybernetics, vol.3, pp.2527-2532 vol.3, 5-8 Oct. 2003.

Campbell, S., "Supporting digital signatures in mobile environments," Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. , vol., no., pp.238-242, 9-11 June 2003.

Karaarslan, E., Teke A., Şengonca H., "BilgisayarAğlarındaGüvenlikPolitikalarınınUygulanması."AkademikBilişimKonferansı, ÇukurovaÜniversitesi, 1s, 2003.

Can, O.; Sahingoz, O.K., "A survey of intrusion detection systems in wireless sensor networks", 6th International Conference on in Modeling, Simulation, and Applied Optimization (ICMSAO), pp.1-6, 27-29 May 2015.

Bashir, U.; Chachoo, M., "Intrusion detection and prevention system: Challenges & opportunities", International Conference on Computing for Sustainable Global Development (INDIA Com), pp.806-809, 5-7 March 2014.

Benmoussa, H.; El Kalam, A.A.; Ouahman, A.A., "Towards a new intelligent generation of intrusion detection system", Proceedings of the 4th Edition of National Security Days (JNS4), pp.1-5, 12-13 May 2014.

Malanik D., Kouril L., “Honeypot as the Intruder Detection System”, In Proceedings of the 17th WSEAS International Conference on Computer, Kos(GR), pp. 96-101, 2013.

Gökırmak Y., Bektaş O., Soysal M., Yiğit S., “Sanal IPv6 BalküpüAğıAltyapısı: Kovan”, Ulusal IPv6 Konferansı, 2011.

Gökırmak Y., Yüce E., Bektaş O., Soysal M., Orcan S., “IPv6 BalküpüTasarımı”, TübitakUlakbim, Ankara, 2011.

RiboldiJordaoda Silva Vargas, I.; Kleinschmidt, J.H., "Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.13, no.3, pp.777-783, March 2015.

Shukla, R.; Singh, M., "PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems," 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), vol., no., pp.1-5, 8-10 Oct. 2014.




DOI: https://doi.org/10.23956/ijarcsse.v9i8.1063

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.