HONEYPOTS IN DIGITAL ECONOMY: AN ANALYSIS OF INTRUSION DETECTION AND PREVENTION

M. S. Rana, M. A. Shah
{"title":"HONEYPOTS IN DIGITAL ECONOMY: AN ANALYSIS OF INTRUSION DETECTION AND PREVENTION","authors":"M. S. Rana, M. A. Shah","doi":"10.1049/icp.2021.2415","DOIUrl":null,"url":null,"abstract":"Today, many organisations are moving their subscriptions to the cloud because the number of clients is increasing day by day. To provide better services to users with less cost, cloud computing is a fair solution. However, use of cloud services has resulted in different issues such as: hosting service, hardware failure and memory allocation of data, in other words - data loss. There is the risk of security breaches by malicious users. Different sets of new security risks and difficulties have occurred in cloud architectures. Most intrusion detection systems (IDS) and intrusion prevention systems (IPS) are designed to deal with multiple types of attacks and there is no single system that can guarantee security from future attacks. Therefore, there is a need for an integrated system that can provide strong insurance against various risks. In this paper, a detailed review of the role of the firewall, intrusion detection and prevention (IDPS), honeypot, and integration of IDPS with honeypot in the security domain of the cloud is illustrated. One way is that an IDPS will look for data packets, if the data is found to be malicious, the system will be transferred to the honeypot via firewall. In the case of integration of IDPS, honeypot is being used to divert the malicious traffic away from the system. Honeypot is a non-violent infrastructure with limited network information. The attacker will understand it as a real environment and go here and there to get basic information. At this point, we can easily find the attacker. Our analysis goal is to provide an easy and concise view of the different security models for cloud architecture.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2415","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Today, many organisations are moving their subscriptions to the cloud because the number of clients is increasing day by day. To provide better services to users with less cost, cloud computing is a fair solution. However, use of cloud services has resulted in different issues such as: hosting service, hardware failure and memory allocation of data, in other words - data loss. There is the risk of security breaches by malicious users. Different sets of new security risks and difficulties have occurred in cloud architectures. Most intrusion detection systems (IDS) and intrusion prevention systems (IPS) are designed to deal with multiple types of attacks and there is no single system that can guarantee security from future attacks. Therefore, there is a need for an integrated system that can provide strong insurance against various risks. In this paper, a detailed review of the role of the firewall, intrusion detection and prevention (IDPS), honeypot, and integration of IDPS with honeypot in the security domain of the cloud is illustrated. One way is that an IDPS will look for data packets, if the data is found to be malicious, the system will be transferred to the honeypot via firewall. In the case of integration of IDPS, honeypot is being used to divert the malicious traffic away from the system. Honeypot is a non-violent infrastructure with limited network information. The attacker will understand it as a real environment and go here and there to get basic information. At this point, we can easily find the attacker. Our analysis goal is to provide an easy and concise view of the different security models for cloud architecture.
数字经济中的蜜罐:入侵检测与防御分析
如今,由于客户数量日益增加,许多组织正在将其订阅转移到云上。为了以更低的成本为用户提供更好的服务,云计算是一个公平的解决方案。然而,云服务的使用导致了不同的问题,例如:托管服务、硬件故障和数据的内存分配,换句话说——数据丢失。存在恶意用户破坏安全的风险。云架构中出现了各种新的安全风险和困难。大多数入侵检测系统(IDS)和入侵防御系统(IPS)都是为了应对多种类型的攻击而设计的,没有一个系统可以保证未来攻击的安全性。因此,有必要建立一个能够针对各种风险提供强有力保险的综合系统。本文详细介绍了防火墙、入侵检测和防御(IDPS)、蜜罐以及入侵检测和防御与蜜罐在云安全域中的集成的作用。一种方法是,IDPS将查找数据包,如果发现数据是恶意的,系统将通过防火墙转移到蜜罐。在集成IDPS的情况下,蜜罐被用来将恶意流量从系统转移出去。蜜罐是一个具有有限网络信息的非暴力基础设施。攻击者会把它理解为一个真实的环境,然后到处去获取基本信息。此时,我们可以很容易地找到攻击者。我们的分析目标是为云架构的不同安全模型提供一个简单而简洁的视图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信