Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Title | Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Mahajan, V., Peddoju, S. K. |
Conference Name | 2017 International Conference on Computing, Communication and Automation (ICCCA) |
Date Published | may |
ISBN Number | 978-1-5090-6471-7 |
Keywords | cloud computing, cloud environment, Cloud Security, cloud-computing technology, Collaboration, composability, Computer architecture, cost services, Dynamic Malware Analysis, Honeypot Network, honeypot networks, Intrusion detection, invasive software, malicious attacks, Malware, malware analysis, network intrusion detection system, network intrusion detection systems, NIDS module, openstack, policy, Policy-Governed Secure Collaboration, Policy-Governed systems, Ports (Computers), pubcrawl, Sandboxing, sandboxing environment, Servers, Signature-based detection, Snort |
Abstract | With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks. The methods of detection of intrusion and deployment of NIDS in cloud environment are dependent on the type of services being rendered by the cloud. It is also important that the cloud administrator is able to determine the malicious intensions of the attackers and various methods of attack. In this paper, we carry out the integration of NIDS module and Honeypot Networks in Cloud environment with objective to mitigate the known and unknown attacks. We also propose method to generate and update signatures from information derived from the proposed integrated model. Using sandboxing environment, we perform dynamic malware analysis of binaries to derive conclusive evidence of malicious attacks. |
URL | https://ieeexplore.ieee.org/document/8229911/ |
DOI | 10.1109/CCAA.2017.8229911 |
Citation Key | mahajan_integration_2017 |
- Malware Analysis
- Snort
- Signature-based detection
- Servers
- sandboxing environment
- sandboxing
- pubcrawl
- Ports (Computers)
- Policy-Governed systems
- Policy-Governed Secure Collaboration
- Policy
- openstack
- NIDS module
- network intrusion detection systems
- network intrusion detection system
- Cloud Computing
- malware
- malicious attacks
- invasive software
- Intrusion Detection
- honeypot networks
- Honeypot Network
- Dynamic Malware Analysis
- cost services
- computer architecture
- composability
- collaboration
- cloud-computing technology
- Cloud Security
- cloud environment