Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{180298,
author = {TAMMALI SRAVANI and SONTIREDDY SANGEETHA and DENDI KARTHIKA and GANPA SHIVA and MRS. M. VEENA and Dr. M. RAMESH},
title = {Honeycloud: A Honeypot Network Approach for Enhanced Security in the Cloud},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {1},
pages = {779-783},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=180298},
abstract = {In the evolving landscape of cloud security,
traditional
defenses
often
fall
short
against
sophisticated cyber threats. HoneyCloud introduces an
innovative honeypot network approach designed to
enhance cloud security by intercepting and analyzing
malicious activities. Positioned between the user and
the cloud server, the honeypot server authenticates
incoming requests, allowing legitimate users access
while engaging malicious actors with deceptive
responses. Upon receiving a request, the honeypot
authenticates credentials, granting access to genuine
users. For requests with invalid credentials, the
honeypot monitors the attacker’s actions, serving fake
responses, including deceptive files instead of empty
pages. This strategy misleads attackers into believing
they have successfully compromised the server,
prompting them to continue their malicious activities.
By maintaining the illusion of a successful breach, the
honeypot gathers detailed information about the
attacker's tactics and patterns. This method overcomes
the limitation of serving empty responses, which often
alert attackers to the honeypot's presence. Instead,
serving fake files ensures continued engagement from
attackers, providing valuable data for administrators
to identify and block malicious IP addresses.
HoneyCloud significantly strengthens cloud security,
enabling proactive defense and enhancing the ability to
detect and mitigate threats effectively.},
keywords = {Cloud computing, false positives, honeypots, honeycloud, real-time response, security vulnerabilities, threat intelligence, zero-day vulnerabilities},
month = {June},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry