Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{180298, author = {TAMMALI SRAVANI and SONTIREDDY SANGEETHA and DENDI KARTHIKA and GANPA SHIVA and MRS. M. VEENA and Dr. M. RAMESH}, title = {Honeycloud: A Honeypot Network Approach for Enhanced Security in the Cloud}, journal = {International Journal of Innovative Research in Technology}, year = {2025}, volume = {12}, number = {1}, pages = {779-783}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=180298}, abstract = {In the evolving landscape of cloud security, traditional defenses often fall short against sophisticated cyber threats. HoneyCloud introduces an innovative honeypot network approach designed to enhance cloud security by intercepting and analyzing malicious activities. Positioned between the user and the cloud server, the honeypot server authenticates incoming requests, allowing legitimate users access while engaging malicious actors with deceptive responses. Upon receiving a request, the honeypot authenticates credentials, granting access to genuine users. For requests with invalid credentials, the honeypot monitors the attacker’s actions, serving fake responses, including deceptive files instead of empty pages. This strategy misleads attackers into believing they have successfully compromised the server, prompting them to continue their malicious activities. By maintaining the illusion of a successful breach, the honeypot gathers detailed information about the attacker's tactics and patterns. This method overcomes the limitation of serving empty responses, which often alert attackers to the honeypot's presence. Instead, serving fake files ensures continued engagement from attackers, providing valuable data for administrators to identify and block malicious IP addresses. HoneyCloud significantly strengthens cloud security, enabling proactive defense and enhancing the ability to detect and mitigate threats effectively.}, keywords = {Cloud computing, false positives, honeypots, honeycloud, real-time response, security vulnerabilities, threat intelligence, zero-day vulnerabilities}, month = {June}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry