"INTRUSION DETECTION AND PREVENTION USING HONEYPOT NETWORKS FOR CLOUD SECURITY"
Abstract
Data loss is being caused directly or indirectly by challenges with hardware failure, web hosting, data
space allocation, and memory allocation due to the rapid growth in users. We use cloud computing
techniques to deliver services that are dependable, quick, and affordable. The likelihood of malevolent
individuals compromising this technology's security is rising as a result of its enormous development.
Using a honeypot is one approach to direct harmful traffic away from systems. It is a massive method
that has improved system security in some ways. The idea of Honeypot is applied in a file-sharing
programme that is installed on cloud servers, taking into consideration the many legal difficulties one
may encounter while putting Honeypot on third-party cloud vendor servers. This article covers how to
identify assaults in a cloud-based environment and how to secure it using honeypots, while also
suggesting a novel method for doing so.
Collections
- B.TECH [1324]