Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment

Authors

  • Gulomov Sherzod Rajaboyevich PHD, Associate Professor, Head of the Department of "Information Security", Tashkent University of Information Technology named after Muhammad al-Khwarizmi, Uzbekistan
  • Salimova Husniya Rustamovna Master's degree, specialty "Information Security", Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan
  • Bobomurodov Sharofiddin Azimjon o'g'li Bachelor degree, Faculty of Radio and Mobile Communications, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan

DOI:

https://doi.org/10.31150/ajshr.v3i5.1118

Keywords:

Honeypot, low interaction, firewallmikrotik, wireless

Abstract

Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

References

Anagnostakis, Kostas G., et al. "Detecting Targeted Attacks Using Shadow Honeypots." Usenix Security Symposium. 2005.

Borisaniya, Bhavesh, et al. "Incorporating Honeypot for intrusion detection in cloud infrastructure." IFIP International Conference on Trust Management. Springer, Berlin, Heidelberg, 2012.

Dahbul, R. N., C. Lim, and J. Purnama. "Enhancing Honeypot deception capability through network service fingerprinting." Journal of Physics: Conference Series. Vol. 801. No. 1. IOP Publishing, 2017.

Rodrigues, Marcos, and OlamilekanShobayo. "Design and Implementation of a Low-Cost Low Interaction IDS/IPS System Using Virtual Honeypot Approach." Covenant Journal of Informatics & Communication Technology 5.1 (2017): 48-64.

Diansyah, TengkuMohd, et al. "Analysis of Using Firewall and Single Honeypot in Training Attack on Wireless Network." Journal of Physics: Conference Series. Vol. 930. No. 1. IOP Publishing, 2017.

Cao, Jianhong, et al. "Dipot: A distributed industrial Honeypot system." International Conference on Smart Computing and Communication. Springer, Cham, 2017.

Singh, Abhay Nath, Shiv Kumar, and R. C. Joshi. "Intrusion Detection System Based on Real Time Rule Accession and Honeypot." International Conference on Network Security and Applications. Springer, Berlin, Heidelberg, 2011.

Tiwari, Ritu, and Abhishek Jain. "Design and analysis of distributed Honeypot system." International Journal of Computer Applications 55.13 (2012).

Downloads

Published

2022-05-30

How to Cite

Rajaboyevich, G. S. ., Rustamovna, S. H. ., & o’g’li, B. S. A. . (2022). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. American Journal of Social and Humanitarian Research, 3(5), 266–270. https://doi.org/10.31150/ajshr.v3i5.1118