Deception as a service: Intrusion and Ransomware Detection System for Cloud Computing (IRDS4C)

被引:0
作者
Ahmed El-Kosairy
Nashwa Abdelbaki
机构
[1] Nile University,School of Information Technology and Computer Science
来源
Advances in Computational Intelligence | 2023年 / 3卷 / 3期
关键词
Deception-as-a-service; Canary files; Decoy resources; Files positioning; Honeypot; Intrusion detection; Ransomware detection;
D O I
10.1007/s43674-023-00056-0
中图分类号
学科分类号
摘要
Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility, and more at a low cost. This expands the attack surface and factors, resulting in more attacks, vulnerabilities, and corruption. Traditional and old security controls are insufficient against new attacks and cybercrime. Technologies such as intrusion detection system (IDS), intrusion prevention system (IPS), Firewalls, Web Application Firewall (WAF), Next-Generation Firewall (NGFW), and endpoints are not enough, especially against a new generation of ransomware and hacking techniques. In addition to a slew of cloud computing options, such as software as a service (SaaS), it is challenging to manage and secure cloud technology. A new technique is needed to detect zero-day attacks related to ransomware, targeted attacks, or intruders. This paper presents our new technique for detecting zero-day ransomware attacks and intruders inside cloud technology. The proposed technique is based on a deception system based on honey files and tokens.
引用
收藏
相关论文
共 34 条
[1]  
Ashish Patel J(2020)A malicious activity monitoring mechanism to detect and prevent ransomware Comput Fraud Secur 2020 14-19
[2]  
Avijit TMR(2021)Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security Elsevier Microproc Microsyst 81 103719-10
[3]  
Davies SR(2021)Differential area analysis for ransomware attack detection within mixed file datasets Comput Secur 108 102377-306
[4]  
Macfarlane R(2021)The anomaly-and signature-based IDS for network security using hybrid inference systems Math Probl Eng 2021 1-299
[5]  
Einy S(2021)Ransomcare: data-centric detection and mitigation against smartphone crypto-ransomware Comput Net 191 108011-26
[6]  
Oz C(2022)An open dataset of ransomware storage access patterns for training machine learning models Fore Sci Int Digital Invest 40 301314-4007
[7]  
Navaei YD(2021)Preparedness for the death of an elderly family member: a possible protective factor for pre-loss grief in informal caregivers Archiv Gerontol Geriatr 94 104353-1137
[8]  
Faghihi F(2021)Signature-less ransomware detection and mitigation J Comp Virol Hack Tech 4 299-2102
[9]  
Zulkernine M(2022)The rise of ransomware: Forensic analysis for windows-based ransomware attacks Exp Syst Appl 190 116198-undefined
[10]  
Hirano M(2020)GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot Comp Secur 92 101732-undefined