Honeypots For Cloud Computing
Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.4, No. 1)Publication Date: 2013-06-08
Authors : Eduardo Henrique de Moura; Zair Abdelouahab;
Page : 180-188
Keywords : Honeypots; Cloud Computing; Security; Virtualization.;
Abstract
With the advance of internet use and the search for greater mobility, cloud computing is becoming an option for those who want to access their data and other services from anywhere . With the increased use and adoption of this technology by large companies, security has become a big issue to their growth. Cloud computing facilities (public as well as private) are becoming targets of numerous malicious attacks.?? In this paper, we provide a survey of cloud computing, highlighting security strategies using honeypots. We present some models of honeypots available in the literature and conclude the paper with a critical analysis.
Other Latest Articles
- Denial of Service on TCP/IP Security Protocols: Vulnerabilities, Tools and Countermeasures
- A novel Hybrid Inaudible Audio Watermarking with Binary Image as Watermark using DWT
- Measuring the usage of Cloud
- A Critical Study Of Existing Approaches Based On Quality Of Information Attributes And Metrics In Wireless Sensor Network
- EFFECT OF THE CONSTRUCTIONS AND PLANTING PLANS ON THE YIELD OF THE HAZELNUT CULTIVAR SVYATKOVY STANDARD LAYERS IN A MOTHER PLANTATION FOR VEGETATIVE REPRODUCTION
Last modified: 2016-07-02 18:06:16