Abstract

A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in Cloud environment where anything like technology, tool, and result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. Production honeypot is one of the types of honeypot which is used to solve the problem of data security in organizations. Honeypot techniques are used to detains the actions of intruder and create a log-file for providing better security in to the cloud network. Kerberos is a protocol for validating the services which requests between true hosts across the network, such as the internet. Kerberos builds on symmetric key cryptography and needed trusted third party, Key Distribution Centre(KDC) which uses public key cryptography. This paper presents the concept of production and research Honeypot as a service in cloud environment by implementing the benefits of Kerberos Authentication system, which distinguishes between hackers and users, and to provide overall security to the data/network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call