STOCK MARKET UPDATE

Ticker

6/recent/ticker-posts

Honey pot based new algorithm for data security,

Abstract
Cloud computing an emerging technology provides various services to the users like infrastructure, hardware, software, storage etc. So, it is necessary that cloud computing network should always free from attack. Various strict security checking systems are used for making network bugs free and honey pot is among one of the tool that is used to provide security. Various models are proposed for honey pot to solve the problem of industries and that is used to captures the activities of attackers and maintains a log for providing better security to the cloud network. Here in this paper we proposed an algorithm to resolve some of the issues of network security.


INTRODUCTION
Cloud  computing  is  a  centralized
controlling  system in  which minimal  resources are
offered by the providers, due to which intruder easy
gain access to the resources and breach the security.
Cloud computing  allows the user to take  benefit of
the  technologies.  It  is  used  for  delivery  of  its
services  like-servers,  storage,  databases,  [5]
networking, software, analytics and many more. It is
agile for the  organization in improving the services
provided  to  the  user.  One  of  the  foremost
characteristics  of the  cloud computing  by which  it
provides flexibility to the user through the reduction
of cost. Other one cloud computing services is speed
which  is  provided  to  self  service  and  on  demand
large amount of computing resources transfer within
a minute without any pressure of capacity planning.
Here cloud  knew at which  time how much  amount
of  power,  bandwidth  and  storage  is  required
according to the geographic conditions [6]. By using
on-time data centers in computing productivity gets
increases.  It  becomes  more  reliable  as  it  secures
data, disaster recovery. Types of cloud services are
IaaS  (Infrastructure  as a  Service)  in this  customer
can get infrastructure and virtual machine, networks
on rent. PaaS  (Platform as  a Service) it is designed
to make a platform for the user to develop a web or
mobile apps without applying setup behind  it. SaaS
(Software as  a Service)  it is  designed to develop a
software  on  demand  for  the  user.  Cloud  provider
host  and  manages  the  application,  underlying
infrastructure and handle maintenance too. There are
three different ways to deploy cloud computing like-
public, private and hybrid cloud. Virtualization is the
new  technology  of  the  cloud  computing.  This
technology  divided physical  computers into  virtual
devices by which they  can easily  manage the  task.
Generally cloud provider is using traditional security
system to  avoid authorized access  of the  resources.  
Virtualization is a key point in the cloud system that
provides  multiple  virtual  instance  of  a  physical
resource  and  if  a  single  instance  of  a  resource
susceptible  then connected  clients  are affected  [7].
Honeypot  is  a  very  simple  technique  and  always
keep  the  information  in  small  parts.  It  gives  the
security  to  the  network  by  using  encryption
technique. If any attacker tries to invade or penetrate
in  the  network  by  connecting  this  technique
honeypot will trap, detect and trace its activities. It is
designed  in such  a way that  if anything  thrown at
them will capture whether it may be tool or strategy.
As  honeypot is  a  source  of information  system, it
comprises  of  data,  computers  and  segments  of
network.  It  has  a  special  feature  of  continuous
monitoring  the  behavior of  the hacker/attacker  and
requires  minimal  resources  to  trace  the  activity.
Honeyd is an open source honeypot application that
keeps  virtual  host on  network. It’s  a  type of  a  low
interaction  honeypot  which  perform  services  like
FTP, HTTP.  

Honeypot can be classified  into two different types
[8]:
1 Production  Honeypot:  -  It’s  a  type  of  low
interaction honeypot, which is  easy to  use and
has only limited information about  the  hacker’s
reroute and justifying his attacks. It is applied in
business corporations and organization.
2 Research Honeypot: It  gives detail information
about the strategy and motives of the attacker. Is  complex  to  implement  and  mainly  used  in
military, research and government organization.
Honeypots are classified into different ways like:
 Low-interaction Honeypots: It requires only one
physical  machine.  This  honeypot  gives  the
information about the attacker who is frequently
access the network. They use only few resources
on  the multiple  virtual  machines  with  a small
response  time.  It  requires less  code  by  which
complexity of security gets reduced.
 Medium-interaction  Honeypot:  In this  attacker
is not in communication with real system. This
honeypot  did not  gives  you detail  information
about  the  hacker.  It  gives  partial  service  as
compare to low-interaction honeypot.
 High-interaction Honeypot: It works on isolated
network  on which  hosts variety  of services.  It
gives  the  maximum  amount  of  attacker’s
information  activities  when  interact  with  our
system. This technique is implementing  on one
physical  machine  per  honeypot  which  direct
increase the cost and maintenance. It is complex
to install but security is an issue.
  Honey  pot  gives  us  valuable  information
about  the  attacker’s action  [9].  The honeypot  is  a
system  or  computer  who  sacrifices  themselves  to
target  the  attacker  of  hackers.  The  aspire  of  the
Honey pot is investigating, understanding, watching
and tracking hackers perspective in order to create a
protected system by its different behavior as follows:
A. Analyzing intruder behavior using Honey pot
– Honey pot is a system on  network is used to
trap, monitor an identifier the suspicious request
in the system. It is actually a tool to collect the
evidence  or  behavior  about  hacker  and  their
attacking methodology.  By this  we redirect the
attacker or  hacker from the actual  setup of the
network  to  the  virtual  system[10].Various
honeypots  techniques  are  exist  like  Dionaea,
Kippo and Amun used in cloud platform.

Following are the steps by which any simulator work
in the virtual environment in the cloud platform:-
1. Collecting the behavior of the intruder on the
basis of certain parameters
  Behavior of the intruders is collected on the
basis of below given arguments which will be stored
in the log table.

1.1  User  IP  address  – Using  simulator  we  can
easily collect the IP address of the intruder IP.
1.2  Pattern  recognition  – Various  intruders  have
different behavior like replicating the data and used
for some intentionally designed network, editing the
data, harm the network, damage the trust boundaries
of the users etc.
1.3 Frequency of accessing the network or system
– This is used  to monitor  the attempt  of malicious
user and  calculating the frequency  of accessing the
network.

B. Encrypt the log table:
  For  providing  enhanced  security  to  our
network, collecting data are stored in log table. It is
also helpful  for making different tools  on the  basis
of  the  collected information.  So  it is  necessary  to
store data in encrypted form in the network.
 II. LITERATURE SURVEY
  G.E.Blonder,1996[1],Dhamija  et.al2000[2],
X.  Suo et.al2005[3]   proposed  a recognition-based
graphical  password system  that authenticates  users
by choosing  portfolios among  decoy portfolios.  He
has  discussed  here  many  graphical  password
schemes  have been  proposed  till now  for  securing
data.
  Paul.  A.J,  et.al  2007  [4]  has  presented
security  in  cloud  computing  environment  mostly
uses  right  now  infrastructure  as  a  service  for  the
research.
  Joshi  Ashay  Mukundrao,  et.al  2011[5],
Hwan-Seok  Yang,  2013[10],Muhammet  Baykara,
et.al 2015[13] explained that  Cloud computing and
Intrusion Detection and Prevention Systems are one
such  measure  to  lessen  these  attacks.  Hybrid
Intrusion  Detection  System  (HIDS)  that  combines
the  positive  features  of  two  different  detection
methodologies. He has given many research projects
from the past have built intrusion detection systems
and honeypot architectures based on virtual machine
introspection (VMI) are discussed.
  Stephen  Brown,  et.al  2012  [7],  Michael
Beham  ,et.al  ,2013[9]   given  the  proposed  project
they  conducted  a  study  using  various  honeypots
(Dionaea,  Kippo, and  Amun)within  different cloud
computing  platforms  (such  as  Amazon  EC2,
Windows Azure etc.)  with the objective of learning
more  about  what  kind  of  packets  they  receive
networks.
  Nithin  Chandra  et.al  2012[8],  Ramya.
R,cloud 2015 [14]  presented a Cloud Security using
Honey pots. The purpose of their research paper is to
explain how honey pots are used for securing cloud
systems, their advantages and disadvantages etc. She
explained  in  this  computing  means  accessing  the
data  from  data centers  that  reduces the  chances of
eavesdropping  and  storage  cost.  Sultan  Aldossary,
et.al 2016[1
 explained
that  Cloud  computing  change  the  entire  world  as
necessity grows day by day by moving the data into
cloud.  Data stored  in the  cloud which  is in  virtual
machine use to share resources in cloud. Yunfei CI,
et.al  2017[17],  Liangxuan  Zhang,et.al  2017[18]
explained  that  cryptography  gives  assurance  to
network and information security.  In cryptography
attribute  based  encryption  (ABE)  is  one  of  the
technique to protect the data.

2. Issues in network security:
  In  network security,  number of techniques
exist to detect malicious [14] user, misuse and abuse
of  computer  systems  by  many  types  of  intruders
irrespective  of  any  network  they  belong.  Cloud
computing is a drastically growing technology which
provide services to users as per their demand. Many
companies  are  migrating  in  the  cloud  computing
environment but still have some security issues. For
this reason we need to find a new tool to make data
more  secure and  safe.  Virtualization is  one  of the
important  component  of  the  cloud  computing.  It
provides  an  illusion  of  something  like  virtual
computer,  storage  device,  and  network,  hardware
platform resources [13]. Some security issues are as
follows with their possible solutions:-
1. A  Cross  Virtual  Machine  Side-Channel
Attacks:-In  this  attacker  attack  through  side-
channel.  Through  the  channel  information  get
leaked by stealing the cryptographic key.
      Possible Solution:-[2]  For security of the key  if
substitution  method is  applied  in  the key  with
two level securities like generate the OTP (One
Time Password).
2. VM Image Sharing: - In this, threat is inside the
image and forward it to others. By this act data
can be leaked or it harm in many ways.
       Possible Solution: - [1] By sharing any image be
alert  and  provide  some  security  features  like
apply  some  cryptographic  technique  in
encapsulate  the image  in the  form of  text and
then share it.
3. VM Isolation: - In this single machine contains
more than one virtual machine has its own guest
operating  system.  If one  operating  system  get
fails other start work.
       Possible Solution: - Each VM in a single system
has secured independently by anti-virus, so that
by sharing hardware resources of the system.
4. VM  Escape:-In  this  VMM  (virtual  machine
manager)  manages  the  data  malicious  user
escape  from  [13]  the  manager  from  which  it
direct  communicate  with  the  host  operating
system.
       Possible Solution: - Whenever any unauthorized
user  try  to  interact  with  the  host  operating
system the alarm generate to the manager in the
form of pop-up message.
5. VM Migration: - In this when one migrate in the
virtual machine from one host to another. It has
some types like cold migration in this move the
virtual machine from one data centre to another
[15]. Second  one is suspended virtual machine
in  this suspended  virtual  machine  can migrate
from  one  data  centre  to  another.  Another  is
migration  with  VMotion  that  allows  moving
from powered-on virtual machine to a new host.
Last  one  is  migrate  with  storage  VMotion
moves the virtual disk or configuration file of a
powered-on virtual machine to a new data store.
              Possible  Solution:-In  all  this  process
provides security at each level and when migration is
in process rest all process should not be idle so that
attacker must not be benefited.
6. VM  Rollback:-This  process  gives  more
flexibility to the user. When VM rollback to the
previous state but the state is not static, so when
user gives the command of rollback they disable
the previous state.
               Possible  Solution:  - In  this  always check
the previous state it is correct, so try to validate the
state.
7. Hypervisor  Issues:  -  [16]  Hypervisor  or
VMM  (virtual  machine  monitor)  hardware  that
creates  and runs  VM.  The hypervisor  run  on  host
and having guest operating  system. It  manages the
execution of the operating system and assigning the
resources.
Possible Solution: -Each VMM of the host
must have some secure cryptographic techniques so
the attacker should not get benefited.
 As  unauthorized  activities  are  increasing
quickly, Honey  pot is  an effective tool  to find  the
behavior of the intruder who forcefully entered into
the network  with suspicious  intention. Security  has
three  important  features  which  are  prevention,
detection  and  respond.  Some  security  solutions
consist  of  hardware  and  software  components,
whereas  honeypot  have  two  main  features  like
detection  and  respond  [18].  Existing  techniques
cannot  provide  complete  protection  against
intruders, for example:
1 There are  no prevention measures  still existing
for protecting the IP address on the network.

Most  of  the  attack  are  currently  observed  on
SSH  and  HTTP  network.  So  there  is  a
requirement to find counter measures to safe the
network.
3 Hidden intruders are not easy to track which are
making  [17]  DDOS  (Distributed  denial  of
service) attack in the network.

DDOS  (Distributed  Denial  of  Service)  means
making flood attack on a particular node by multiple
nodes at the same time.
  Therefore,  in  this  paper  we  try  to  solve
these issues by mentioning new proposed algorithm.
Our  newly proposed  algorithm for  data security in
honey  pot  is  that  “On  cloud  computing  platform
every  technique use  to store  the  data needed  good
security system by creating virtualization”.
Steps to follow our new algorithm are as follows:-
1. Identify and trap  the privacy  challenges in  the
network.
2. Improve the existing security issues.
3. Develop  authentication  tools  and  protocol  at
firewall level.
4. Enhance  the  security  feature  in  the  network
using cryptography.

A. Analysis Of Algorithm
  Here we have developed new algorithm on
cloud  computing  platform,  every  technique  use  to
store  the  data  needed  good  security  system.  Data
security  is  a  challenging  job  in  current  cloud
computing  network,  due  to  emerging  attack  of
intruder which  is not easy to  track. Various threats
existing in the cloud environment are data breaches,
data loss, traffic hijacking, DDoS, Suspicious users,
SQL injection attack, captcha breaking etc. There are
many  techniques  by  which  data  can  be  hack  like
unauthorized  user  access  the  data,  share  the[3]
password,  pin  number,  one  time  password  by
application scan the finger print. By recovering some
security issues  has some  possible solution like  sms
alert  or  pop-up  message  should  be  on  the  smart
phone  if  someone  hack  the  data  or  protect  the
password  or  pin  number  by  providing  double
security with the cryptographic method. This method
can be  applied at the  firewall level of the network.
This  provides  the  dual  security  to  the  network,
which is shown in figure1. 


Figure1.Graph shows the throughput in different types of
Honeypot and virtualization techniques.

  It  shows  the  throughput  of  the  types  of
honeypot and virtualization. Here in low-interaction
honeypot deals with the minimum system by which
throughput  of  the  system  is  get reduced.  In  high-
interaction  honeypot  maintenance  required  for  the
system  and  security  gets  reduced  by  which
throughput gets affected.  In virtualization technique
we  try  to  work  on  all  the  factors  (cost,  security, maintenance and so  on...), it  becomes complex  but
throughput get increased.

B. Expected Outcome 
   According  to our new  proposed algorithm
the  computers  are  active  on  every  attack  of  the
hacker by penetrating  into the  deeper way. By this
method of penetration administrator planned to have
a  continuous  monitoring on  the  hacker’s  tricks  and
protect  it  by  applying  various  techniques.  Any
malicious  procedure  done  by  intruder  towards  the
authenticity  of  the  data  through  the  [8]  honeypot,
then  these  different  types  of  honeypot  technique
record its activity and trap there it. By the use of this
table1 we have taken different parameters like cost,
maintenance,  security  and  complexity  applied  on
various  types  of  honeypot  and  on  our  algorithm
virtualization to get the overview.
As  in  the  low  interaction  honeypot  they
need minimum system requirements so the  network
must be  small, manageable  and will be  secured. In
this  they  don’t  keep  important and  real  data on  the
network.  Now in  the medium  interaction  honeypot
it’s a combination of low and high interaction  different types of Honeypots and virtualization.
honeypot  in  which  attacker  is  not  in  direct
communication with real data. As in high interaction
honeypot system requirement is much high by which
requirement  of  maintenance  is  needed  and cost  is
also increases. It works on isolated network security
is not an issue but they are having simpler design so
it  get easily  be attacked  by  hacker. In  figure2  we
show  the  effect  of  these  factors  (security,  cost,
maintenance,  complexity)  on  these  techniques  so
that  we can increase our efficiency  by working  on
them. This virtualization algorithm works on virtual
environment  (cloud  sim, KFSensor,  etc...)  because
of which gives the output in a desirable way.
  One  of the techniques is data breaches. In
this  type,  attacker  tries to  acquire  encryption  key.
Intruder  always  try  to  gain  access  of  private
cryptographic key. Hacker finds  out the  location of
the company confidential data. Intruder accumulates
various keys for  taking control over sensitive  data.
But  by  having  dual  security  feature  like  scanned
images of finger print or thumb impression, data will
be secure by virtualization environment.
   III. CONCLUSION
  Results of honey pot are used to capture the
activities  of  hackers.  Tools  are  being  used  for
analyzing  the  behavior  of  the  hacker.  Logs  are
maintained and  gather information which is  helpful
for  the network  administrator.  Cloud  computing is
novel technology that provides easy computing and
access to high performance computing,  networking,
storage  and  infrastructure  through  internet.  Cloud
computing have potential to provide high efficiency
and  cost  savings.  As  cloud  computing  is  the
development  trend  in  the  future  that  provides  us
infinite computing  and capability, but  still security
and privacy is a big challenge for cloud computing. 
As  we have  tried  factors on  the different  types  of
honeypot  algorithm. In  the near  future  we  can try
this virtualization algorithm  on the  run time phase,
so that we can increase the  efficiency and  accuracy
to makes the data more secure.

Apurva Saxena1, Dr.Pratima Gautam2, Dr. Anubha Dubey3
1Research Scholar (Computer Science Engineering), Rabindranath Tagore University, Bhopal, India                                                       
2 Dean of Computer Science and Application, Rabindranath Tagore University, Bhopal, India                                                           
3Independent researcher and analyst, Bioinformatics Bhopal, India  
Corresponding Author: Apurva Saxena 

https://www.facebook.com/Kanishk-      
https://ashutoshdubey3489.wixsite.com/kanishksocialmedia
 
 If you like this story, share it with a friend! We are a non-profit organization. Help us financially to keep our journalism free from government and corporate pressure

Post a Comment

0 Comments

Custom Real-Time Chart Widget

'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();

market stocks NSC