Show simple item record

dc.contributor.authorMeyakhel, Abdul Naseer
dc.contributor.authorDar, Manish Kumar
dc.date.accessioned2023-12-07T07:38:58Z
dc.date.available2023-12-07T07:38:58Z
dc.date.issued2023-05
dc.identifier.urihttp://10.10.11.6/handle/1/12279
dc.description.abstractData loss is being caused directly or indirectly by challenges with hardware failure, web hosting, data space allocation, and memory allocation due to the rapid growth in users. We use cloud computing techniques to deliver services that are dependable, quick, and affordable. The likelihood of malevolent individuals compromising this technology's security is rising as a result of its enormous development. Using a honeypot is one approach to direct harmful traffic away from systems. It is a massive method that has improved system security in some ways. The idea of Honeypot is applied in a file-sharing programme that is installed on cloud servers, taking into consideration the many legal difficulties one may encounter while putting Honeypot on third-party cloud vendor servers. This article covers how to identify assaults in a cloud-based environment and how to secure it using honeypots, while also suggesting a novel method for doing so.en_US
dc.language.isoen_USen_US
dc.subjectComputer Science, Engineering, Data loss, HONEYPOT NETWORKS, Internet Security, CLOUDen_US
dc.title"INTRUSION DETECTION AND PREVENTION USING HONEYPOT NETWORKS FOR CLOUD SECURITY"en_US
dc.typeTechnical Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record