Detection of Intrusion and Honey Net Architecture Approach to Defend in Virtual Network Systems
Lakshmi HV

Lakshmi HV, Department of Computer Science and Engineering, M.S. Ramaiah Institute of Technology, Bangalore (Karnataka), India.
Manuscript received on 15 October 2015 | Revised Manuscript received on 25 October 2015 | Manuscript Published on 30 October 2015 | PP: 38-40 | Volume-5 Issue-1, October 2015 | Retrieval Number: E3117063514/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security in cloud is one of the most important issues that drawn interest of research and development in past years. Hackers can explore vulnerabilities of cloud system and to deploy large-scale Distributed Denial-of-Service they compromise virtual machines. Distributed Denial-of-Service attacks involve early stage actions as multi-step exploitation, less frequency vulnerability scanning, and compromising insecure virtual machines, and Distributed Denial-of-Service attacks through the compromised VMs. In cloud system, the detection of zombie attacks is difficult. Because users may install insecure applications on their VMs to avoid insecure virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability finding, and Honey Net approach to fight back the attack. Honeypot is a data system resource and its value lies in unauthorized use of that resource of system. Honey nets are “a security resource whose value lies in being attacked”. Honeypots and honey nets are used to collect data about threats that organizations might face and hence protect them.
Keywords: Network Security, Honey Pot, Honey Net, Cloud Computing, Intrusion Detection

Scope of the Article: Network Security