KERBEROS BASED DATA SECURITY IN RESEARCH & PRODUCTION HONEY POT

Authors

  • Ms. Apurva Saxena Research Scholar, Computer Science Engineering, Rabindranath Tagore University, Bhopal, India
  • Dr. Pratima Gautam Dean of Computer Science and Application,Rabindranath Tagore University, Bhopal, India
  • Dr.Anubha Dubey Independent Researcher and analyst, Bioinformatics,Independent Researcher,Gayatri Nagar,Katni,India

DOI:

https://doi.org/10.53555/eijse.v5i1.110

Keywords:

Honeypot, Kerberos, Cryptography

Abstract

A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods  of  attack.  This technique will seize, recognize and duplicate  the  hacker behavior. It works  in  Cloud  environment where  anything  like technology, tool, and result can be offered as a service. Purveyors offer and deliver such services  to  their  customers  via  the  network. Production  honeypot  is  one  of  the  types  of honeypot which is used to solve the problem of data security in organizations. Honeypot techniques are used to detains the actions of intruder and create a log-file for providing better security in to the cloud network. Kerberos is a protocol for validating the services which  requests  between  true  hosts  across  the  network,  such  as  the  internet. Kerberos builds  on  symmetric  key  cryptography  and  needed  trusted  third  party, Key  Distribution Centre(KDC)  which  uses  public  key  cryptography. This  paper  presents  the  concept of production and research Honeypot as a service in cloud environment by implementing the benefits  of Kerberos  Authentication  system, which distinguishes between hackers  and users, and to provide overall security to the data/network.

References

. G. E. Blonder: Graphical password,U.S.Patent5 559 961, (1996).

. R. Dhamija, A. Perrig,: A user study using images for authentication.Proc. 9thUSINEXSecurity Symp. CO, pp. 45–58 Denver, (2000).

. X. Suo, Y. Zhu, G. S. Owen,:Graphical passwords: A survey, Proc. 21stAnnu.Comput. SecurityAppl. Conf, pp. 463–472 (2005).

. Paul. A.J, Varghese Paul, P. Mythili,: A Fast and Secure Encryption Algorithm For Message Communication, In: IET-UK InternationalConference on Information and Communication Technology in Electrical Sciences (ICTES 2007), pp. 629-634 Chennai, Tamil Nadu, India. (2007).

. Junjie Peng, et.al, Comparison of Several Cloud Computing Platforms In: Second International Symposium on Information Science and Engineering 978-0-7695-3991-1 (2009).

. Joshi Ashay M., et.al,:EnhancingSecurity in Cloud Computing. In: Information and KnowledgeManagement, Vol 1, No.1, (2011).

. Ajeet Kumar G., et.al,: An Improved Hybrid Intrusion Detection System in Cloud Computing. Int: International Journal of Computer Applications (0975 –8887) Vol.53–No.6, (2012).

. Stephen B., Rebecca L., Shishir P., Sivasubramanian R., and Josh S., : Honeypots in the Cloud,University of Wisconsin –Madison,(2012).

. Nithin C., S.R, Madhuri, : Cloud Security using Honeypot Systems, In: International Journal ofScientific & Engineering Research Vol.3, Issue 3, (2012).

. Aishwarya.S,et.al, Implementation of Honeypot using Kerberos Authentication In: International Journal of Computational Engineering Research (IJCER) ,(2012).

. Michael Beham, et.al, :Intrusion detection and Honey pots in nested virtualization environments In: DSN, 43rd Annual IEEE/IFIPInternational Conference on Dependable Systems and Networks, pp1-6 Budapest (2013).

. Hwan-Seok Y. ,: A study on attack information collection using virtualization technology,74:8791–8799, Springer Science + Business Media New York (2013).

. Al Awadhi, E, et.al, : Assessing the security of the cloud environment, In: IEEE Conference,Page(s) 251 –256 (2013).

. Kumar S. , et.al, : A Prevention of DDos Attacks in Cloud Using Honeypot In: International Journal of Science and Research (IJSR) Volume 3 Issue11 (2014).

. Muhammet Baykara, et.al,: A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems, Int : International Journal of Computer Networks and Applications (IJCNA) Vol.2, Issue 5 (2015).

. Ramya.R,: Securing the system using honeypot in cloud computing environment, Int:International Journal ofMultidisciplinary Research and Development, Vol.2, Issue: 4, 172-176 (2015).

. Hoa Quoc Le ,et.al, A New Pre-authentication Protocol in Kerberos 5: Biometric Authentication Conference Paper, (2015).

. Romendrapal Singh Rathore ,et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.1, pg. 120-127(2015).

. Marcin N., et.al,: A Survey on Honeypot Software and Data Analysis arXiv:1608.06249Cryptography and Security (cs.CR);(2016).

. Sultan A. , et.al,: Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions Int :International Journal of Advanced Computer Science and Applications(IJACSA), Vol. 7, No. 4, (2016).

. Gagan, Dr. C. Rama K., Rohit H., :Dynamic Cluster based Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data 978-1-4673-8203-8/16/ 2016 IEEE Int:6th International Conference -Cloud System and Big Data Engineering (Confluence) (2016).

. Akshay A. Somwanshi,et.al,Implementation of Honeypots for Server Security In: International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 03 (2016).

. Yunfei CI, et.al,: Design and Implementation of the Components of the Symmetric Cryptographic Algorithm” Int:IEEE Second International Conference on Data Science in Cyberspace 978-1-5386-1600-0/17 IEEE (2017).

. Liangxuan Zhang, et.al, : Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures Int: IEEE Second International Conference on Data Science in Cyberspace 978-1-5386-1600-0/17 IEEE (2017).

. Ashok Kumar J, et.al, A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual CryptographyIn: International Journal of Applied Engineering ResearchVolume 12, Number 21 pp. 11218-11223 (2017).

. AZURE Homepage, https://azure.microsoft.com/en-in/overview/what-is-cloud-computing,last accessed 2018/09/27.

. Chaimae S., Habiba C.: Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb, Int: International Conference on Computational Modeling and Security (CMS 2016), Morocco (2016).

. Sushant M., Makarand K., Krantee J.: Application of Honeypot in Cloud Security: A Review, Int :International Journal on Future Revolution in Computer Science & Communication Engineering (2018).

. Nooreen Fatima Khan, et.al, HONEY POT AS A SERVICE IN CLOUD In:International Journal of Pure and Applied Mathematics Volume 118 No. 20 (2018).

. AMAZON Homepage ,https://aws.amazon.com/about-aws/,last accessed 2018/11/25.

. Kerberos , https://cbt.gg/2CsnIRh,last accessed 2018/11/01.

Downloads

Published

2019-03-27