Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment

dc.creatorRajaboyevich, Gulomov Sherzod
dc.creatorRustamovna, Salimova Husniya
dc.creatoro'g'li, Bobomurodov Sharofiddin Azimjon
dc.date2022-05-30
dc.date.accessioned2023-08-21T07:23:42Z
dc.date.available2023-08-21T07:23:42Z
dc.descriptionSecurity issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.en-US
dc.formatapplication/pdf
dc.identifierhttps://globalresearchnetwork.us/index.php/ajshr/article/view/1118
dc.identifier.urihttp://dspace.umsida.ac.id/handle/123456789/9994
dc.languageeng
dc.publisher"GLOBAL RESEARCH NETWORK" LLCen-US
dc.relationhttps://globalresearchnetwork.us/index.php/ajshr/article/view/1118/1037
dc.sourceAmerican Journal of Social and Humanitarian Research; Vol. 3 No. 5 (2022): American Journal of Social and Humanitarian Research; 266-270en-US
dc.source2690-9626
dc.subjectHoneypoten-US
dc.subjectlow interactionen-US
dc.subjectfirewallmikrotiken-US
dc.subjectwirelessen-US
dc.titleIntegrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environmenten-US
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Articleen-US
Files