Abstract
Security issues and challenges constitute, undoubtedly, one of the major risks of using cloud computing services. There are approaches that address security requirements, nevertheless there are no guarantees that security breaches are not going to occur in this complex infrastructure. Coordinated and sophisticated attacks pose a significant threat to cloud environments and vendors need to be prepared to prevent, detect, and recover from them. In this paper, the focus of the discussion is on how honeypots, a nontraditional security technology not adequately represented in the protection mechanisms pool, could be deployed in the cloud to allow the analysis of attack patterns. To be more specific, CloudHoneyCY is presented, an open-source framework that supports a collection of low-interaction and high-interaction honeypots deployed in the cloud infrastructure with the purpose of collecting and analyzing attack data that AIDS in constructing attack profiles.
Original language | English |
---|---|
Title of host publication | Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 630-635 |
Number of pages | 6 |
ISBN (Electronic) | 9780769556970 |
DOIs | |
Publication status | Published - 2015 |
Event | 8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015 - Limassol, Cyprus Duration: 7 Dec 2015 → 10 Dec 2015 |
Other
Other | 8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015 |
---|---|
Country/Territory | Cyprus |
City | Limassol |
Period | 7/12/15 → 10/12/15 |
Keywords
- cloud security
- honeyCY
- honeypots
- unified management framework