Open Access Open Access  Restricted Access Subscription or Fee Access

Modern Honey Pot Tools on Cloud Virtual Machines for Machine Learning

Dr. R. Kavitha, V. Madhumita, E. Nandhini

Abstract


Honey pot is a computer security mechanism for trapping the hackers or tracking the unconventional hacking methods. It collects a information about the activities of the hackers using machine learning code. In this description, we discuss about the tools that how an attacker proceeds the way for finding or detecting the honeypots on cloud virtual machines. Machine learning is the technique of embedding artificial intelligence to the system without human intervention. It can change the data automatically based upon the user feed.

Keywords


Honey Pot; Virtual Machines; Machine Learning; Security

Full Text:

PDF

References


Throsten Holz and Frederic Rayanal, Detecting Honeypots And Other Suspicious Environments, Workshop on the Information Assurance and Security,United States Military Academy,2005.

Zhang Li-juan, Honeypot-based Defense System Research and Design, Computer Science and Information Technology, 2009.

Design of Virtual Honeynet Collaboration System in Existing Security Research Networks _ason Chih-Hung Chang *_, and Yi-Lang Tsai * * CyberSecurity Lab., National Center for High-performance Computing, Hsinchu, Taiwan, R.O.C._ SENSE Lab., Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, R.O.C. E-mail: ch.chang@ieee.org, yilang@nchc.org.tw

Arthur Jicha, Mark Patton, and Hsinchun Chen, SCADA Honeypots, Information and Security Informatics (ISI), 2016.

Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. Detecting spammers on twitter.Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS, page 12, 2010).

Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. Detecting spammers on twitter.Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS, page 12, 2010).

Alex Hai Wang. Don’t follow me: Spam detection in twitter. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pages 1–10, July 2010.

Kyumin Lee, James Caverlee, and Steve Webb. Uncovering social spammers: Social honeypots +machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pages 435–442, New York, NY, USA, 2010. ACM

M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC’11, pages 175–186. Springer-Verlag, 2011.

Gianluca Stringhini, Christopher Kruegel, and Giovann Vigna. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pages 1–9, NewYork, NY, USA, 2010. ACM.

Zi Chu, Indra Widjaja, and Haining Wang. Detecting social spam campaigns on twitter. In Applied Cryptography and Network Security, pages 455–472. Springer, 2012.

Juan Martinez-Romo and Lourdes Araujo. Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications, 40(8):2992–3000, 2013.

Mahdi Washha,Aziz Qaroush and Florence Sedes Leveraging Time for Detection on Twitter Spammers,pages-109-117.




DOI: http://dx.doi.org/10.36039/AA042017001.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.