2021
DOI: 10.1016/j.micpro.2020.103719
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…A key issue is accurately describing the statistical characteristics of cyber attacks. In [20] article, we provide the rst statistical approach for thoroughly examining data from cyber attacks that honeypots have detected. A new class of mathematical objects for characterizing cyber attacks, the stochastic cyber attack process, serves as the foundation for the framework, while emphasizing that the system may also be used to analyze high-interaction honeypot data, which provides deeper information on the assaults [21].…”
Section: Related Workmentioning
confidence: 99%
“…A key issue is accurately describing the statistical characteristics of cyber attacks. In [20] article, we provide the rst statistical approach for thoroughly examining data from cyber attacks that honeypots have detected. A new class of mathematical objects for characterizing cyber attacks, the stochastic cyber attack process, serves as the foundation for the framework, while emphasizing that the system may also be used to analyze high-interaction honeypot data, which provides deeper information on the assaults [21].…”
Section: Related Workmentioning
confidence: 99%
“…Mondal et al [7] identify two issues with the security architecture and then offer two strategies to address them. The data's fundamental importance in safeguarding our CPS infrastructure from attack is addressed in the first recommendation, SCCAF (Smart Cloud Computing Adoption Framework).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Avijit Mondal [29] presented an ID approach for detecting malicious attacks when performing data communication or data storage in the cloud. For identifying the malicious behavior, the Convolutional Neural Network (CNN) was used.…”
Section: Intrusion Detection With Encryptionmentioning
confidence: 99%
“…So it is necessary to develop a highly secure encryption model with an efficient authentication scheme. The models such as [29][30][31][32] are developed to achieve both ID and prevention for cloud data. However, they failed to achieve cloud user authentication when performing data transmission and data retrieval in the cloud.…”
Section: Problem Statementmentioning
confidence: 99%