Abstract — Cloud Computing means accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Now here in this paper an efficient technique of intrusion detection is proposed using the concept of honeypots. The data to be send by the cloudlets is accessed by the brokers of the cloud where we have implemented some of the rules for the detection of intrusions. The proposed technique implemented here provides less false alarm ratio and provides more accuracy for the detection of intrusions. I
yesCyber attacks are increasing in every aspect of daily life. There are a number of different tech...
The role of the Internet is increasing and many technical, commercial and business transactions are ...
In the real-world network system, an enormous number of applications and services available for data...
Part 1: Full PapersInternational audienceCloud services delivered as utility computing over the Inte...
Providing security to the server data is the greatest challenge. Security activities range from keep...
With the exponentially spread of the Internet usage, information technology or cyber security is now...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
Abstract:- As computer attacks are becoming more and more difficult to identify the need for better ...
The growing smartphone technology and emerging mobile cloud technology are the latest wireless techn...
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The In...
Recently, as result of dramatic connectivity between devices from a computer to mobile systems, secu...
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unu...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
The number of computers connecting to the internet is getting increased day by day, while the number...
The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of s...
yesCyber attacks are increasing in every aspect of daily life. There are a number of different tech...
The role of the Internet is increasing and many technical, commercial and business transactions are ...
In the real-world network system, an enormous number of applications and services available for data...
Part 1: Full PapersInternational audienceCloud services delivered as utility computing over the Inte...
Providing security to the server data is the greatest challenge. Security activities range from keep...
With the exponentially spread of the Internet usage, information technology or cyber security is now...
International audienceThis paper presents HoneyCloud: a large-scale high-interaction honeypots archi...
Abstract:- As computer attacks are becoming more and more difficult to identify the need for better ...
The growing smartphone technology and emerging mobile cloud technology are the latest wireless techn...
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The In...
Recently, as result of dramatic connectivity between devices from a computer to mobile systems, secu...
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unu...
Very little is known about the exact actions executed by a hacker entering a system. Much insight ca...
The number of computers connecting to the internet is getting increased day by day, while the number...
The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of s...
yesCyber attacks are increasing in every aspect of daily life. There are a number of different tech...
The role of the Internet is increasing and many technical, commercial and business transactions are ...
In the real-world network system, an enormous number of applications and services available for data...