Browse > Article
http://dx.doi.org/10.13067/JKIECS.2015.10.8.891

Prototype Design of Hornet Cloud using Virtual Honeypot Technique  

Cha, Byung-Rae (광주과학기술원 정보통신공학과)
Park, Sun (광주과학기술원 정보통신공학과)
Kim, Jong-Won (광주과학기술원 정보통신공학부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.10, no.8, 2015 , pp. 891-900 More about this Journal
Abstract
Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, and design the concept of active-interaction and security functions of Hornet-Cloud simply.
Keywords
Hornet-Cloud; Cloud Computing; Ddos Attacks; Honeypot; Honeynet; Active-Interaction;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defence mechanisms," Association for Computing Machinery's Special Interest Group in communication and computer networks, Computer Communication Review, vol. 34, no. 2, Apr. 2004, pp. 39-53.
2 M. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. of the 17th Int. Conf. on Parallel and Distributed Computing Systems, 2004 Int. Workshop on Security in Parallel and Distributed Systems, Sep. 2004, pp. 543-550.
3 C. V. Secau, "Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity," J. of Digital Forensics, Security and Law, vol. 5, no. 2, 2010, pp. 35-43.
4 R. Carmo, M. Nassar, and O. Festor, "Artemisa: an Open-Source Honeypot Back-End to Support Security in VoIP Domains," 12th Int. Federation for Information Processing/IEEE Int. Symp. on Integrated Network Management 2011, May 2011, pp. 361-368.
5 S. Brown, R. Lam, S. Prasad, S. Ramasubramanian, and J. Slauson, "Honypots in Cloud," M.S. thesis, University of Wisconsin-Madison, Dec. 2012, http://pages.cs.wisc.edu/-sbrown/downloads/honeypots-in-the-cloud.
6 R. Ramya, "Securing the system using honeypot in cloud computing environment," International J. of Multidisciplinary Research and Development, vol. 2, no. 4, Apr. 2015, pp. 172-176.
7 F. Araujo, K. W. Halen, S. Biederman, and S. Katzenbeisser, "From Patches to Honey-Patche: Lightweight Attacker Misdirection, Deceptiom, and Disinformation," Proc. of CCS '14 Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security, Nov. 2014, pp. 942-953.
8 T. K. Lengyel, J. Neumann, S. Maresca, and A. Kiayias, "Towards Hybrid Honeynets vis Virtual Machine Introspection and Cloning," Network and System Security 2013, June 2013, pp. 1-14.
9 S. Kim, S. Goh, C. Jung, and S. Lee, "Energy-efficient and QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 3, no. 2, June 2008, pp. 71-78.
10 M. Son, and Y. Kim, "A Study on Hierarchical Communication Method for Energy Efficiency in Sensor Network Environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, Aug. 2014, pp. 889-898.   DOI
11 W. Jung and Y. Oh, "A Study on Energy Efficient MAC Protocol based on S-MAC Protocol," The J. of Korean Institute of Communications and Information Sciences, vol. 35, no. 2, Feb. 2010, pp. 43-49.