A Virtual Honeynet Based Botnet Detection (Vhbd) Architecture for Cloud
S. Nagendra Prabhu1, S. Shanthi2, R. Nidhya3
1S. Nagendra prabhu, Professor, Department of CSE, Malla Reddy College of Engineering & Technlogy, Hyderabad, Telangana, India.
2Shanthi.S, Professor, Department of CSE, Malla Reddy College of Engineering & Technlogy,, Hyderabad, Telangana, India.
3Nidhya R, Assistant Professor in the Department of Computer Science & Engineering, Madanapalle Institute of Technology & Science, affiliated to Jawaharlal Nehru Technical University, Anantapuram, India
Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 866-871 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7290068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Securing the cloud services from botnets has gained more attention in the recent years. As the cloud environment is flexible, reliable and scalable, the botnets can easily introduce thousands to millions of bots very easily. Thus, securing the cloud from the botnet is mandatory for preventing the services from various attacks such as Distributed Denial of Service (DDoS), spreading malware and hacking of private information. To prevent botnet from the cloud environment a Virtual Honeynet based Botnet Detection (VHBD) architecture is proposed in this paper. The suggested architecture defines the generation of the botnet using botmaster. Further, on receiving the access request from the cloud user, the VHBD checks the authenticity of the cloud user. If the user is authentic,the access permission is provided through an optimal honeypot installed on the guest OS. Whereas, if the user is non-authentic, the honeywall obtains the malicious IP of the botnet and saves them in the block list. The comparison of performance with the existing techniques prove that the proposed architecture provides optimal results than the other techniques.
Keywords: Cloud Botnet, Honeypot, Virtual Honeynet (VH), Distributed Denial Of Service (Ddos),Botmaster, Honeywall.
Scope of the Article: Service Oriented Architectures