IDS with Honey Pot to Detect Man in Middle Attacks in Cloud Computing
Abstract
Full Text:
PDFReferences
Thu, A. A. (2013). Integrated intrusion detection and prevention system with Honey pot on cloud computing environment. International Journal of Computer Applications, 67(4).
Bakshi, A., &Dujodwala, Y. B. (2010, February). Securing cloud from DDOS attacks using intrusion detection system in virtual machine. In 2010 Second International Conference on Communication Software and Networks (pp. 260-264). IEEE.
Marcinkowski, S.J.; Stanton, J.M., “Motivational aspects of information security policies”, IEEE International Conference on Systems, Man and Cybernetics, vol.3, pp.2527-2532 vol.3, 5-8 Oct. 2003.
Campbell, S., "Supporting digital signatures in mobile environments," Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. , vol., no., pp.238-242, 9-11 June 2003.
Karaarslan, E., Teke A., Şengonca H., "BilgisayarAğlarındaGüvenlikPolitikalarınınUygulanması."AkademikBilişimKonferansı, ÇukurovaÜniversitesi, 1s, 2003.
Can, O.; Sahingoz, O.K., "A survey of intrusion detection systems in wireless sensor networks", 6th International Conference on in Modeling, Simulation, and Applied Optimization (ICMSAO), pp.1-6, 27-29 May 2015.
Bashir, U.; Chachoo, M., "Intrusion detection and prevention system: Challenges & opportunities", International Conference on Computing for Sustainable Global Development (INDIA Com), pp.806-809, 5-7 March 2014.
Benmoussa, H.; El Kalam, A.A.; Ouahman, A.A., "Towards a new intelligent generation of intrusion detection system", Proceedings of the 4th Edition of National Security Days (JNS4), pp.1-5, 12-13 May 2014.
Malanik D., Kouril L., “Honeypot as the Intruder Detection System”, In Proceedings of the 17th WSEAS International Conference on Computer, Kos(GR), pp. 96-101, 2013.
Gökırmak Y., Bektaş O., Soysal M., Yiğit S., “Sanal IPv6 BalküpüAğıAltyapısı: Kovan”, Ulusal IPv6 Konferansı, 2011.
Gökırmak Y., Yüce E., Bektaş O., Soysal M., Orcan S., “IPv6 BalküpüTasarımı”, TübitakUlakbim, Ankara, 2011.
RiboldiJordaoda Silva Vargas, I.; Kleinschmidt, J.H., "Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.13, no.3, pp.777-783, March 2015.
Shukla, R.; Singh, M., "PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems," 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), vol., no., pp.1-5, 8-10 Oct. 2014.
DOI: https://doi.org/10.23956/ijarcsse.v9i8.1063
Refbacks
- There are currently no refbacks.