CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructures

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security issues and challenges constitute, undoubtedly, one of the major risks of using cloud computing services. There are approaches that address security requirements, nevertheless there are no guarantees that security breaches are not going to occur in this complex infrastructure. Coordinated and sophisticated attacks pose a significant threat to cloud environments and vendors need to be prepared to prevent, detect, and recover from them. In this paper, the focus of the discussion is on how honeypots, a nontraditional security technology not adequately represented in the protection mechanisms pool, could be deployed in the cloud to allow the analysis of attack patterns. To be more specific, CloudHoneyCY is presented, an open-source framework that supports a collection of low-interaction and high-interaction honeypots deployed in the cloud infrastructure with the purpose of collecting and analyzing attack data that AIDS in constructing attack profiles.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages630-635
Number of pages6
ISBN (Electronic)9780769556970
DOIs
Publication statusPublished - 2015
Event8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015 - Limassol, Cyprus
Duration: 7 Dec 201510 Dec 2015

Other

Other8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015
Country/TerritoryCyprus
CityLimassol
Period7/12/1510/12/15

Keywords

  • cloud security
  • honeyCY
  • honeypots
  • unified management framework

Fingerprint

Dive into the research topics of 'CloudHoneyCY - An Integrated Honeypot Framework for Cloud Infrastructures'. Together they form a unique fingerprint.

Cite this