Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence 2019
DOI: 10.1145/3330482.3330516
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Public Cloud Model in Honeypot for Data Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In 2019, Saxena, M.A., et al [19] proposed a cloud-based solution for a high-engagement honeypot with EFS (Elastic File System), VPN (Virtual Private Network), VPC (Virtual Private Cloud), and Kerberos as a service to provide network/data security. It would be easy to operate, safe, and cost-effective.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2019, Saxena, M.A., et al [19] proposed a cloud-based solution for a high-engagement honeypot with EFS (Elastic File System), VPN (Virtual Private Network), VPC (Virtual Private Cloud), and Kerberos as a service to provide network/data security. It would be easy to operate, safe, and cost-effective.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since the honeypots are mostly placed inside the firewall program, they are used to secure the system from intruders from corporate organizations. A honeypot is a trap designed to deceive an intruder by disrupting an information system in an organization [92]. It can be used as early warning and advanced security monitoring tools to minimize the risk of attacks on IT systems and networks.…”
Section: Honeypotmentioning
confidence: 99%
“…Accordingly, a few researchers have oriented their analysis and studies towards cloud infrastructures. For instance, the authors of [21] have developed a high interaction system using Kerberos authentication, Virtual Private Cloud, and Elastic File System to understand the malicious nature of attackers; the authors of [13] have developed honeypot as a service model for luring attackers. This honeypot-as-aservice is implemented as a plug-and-play model, which could be hosted on gateways for capturing the malicious attackers; and, a few practitioners have listed the AWS honeypot data that suggested potential hackers, who attempted to maliciously attack AWS cloud services, including AWS IoT services.…”
Section: Honeypot Research -Domains Placements and Cloudsmentioning
confidence: 99%