Published on: April 2026
HONEY CLOUD: A HONEYPOT NETWORK APPROACH FOR ENHANCED SECURITY TO THE CLOUD
A.VISHNU PRIYA I.Y BHARATH P.SAI KIRAN G. SWARANALATHA
V.NARESH KUMAR
Article Status
Available Documents
Abstract
To counteract these threats, one common method is to restrict the number of login attempts. When a user enters incorrect credentials multiple times, the account may be temporarily locked. While this approach can reduce unauthorized access, it does not help in understanding how the attacker is attempting to break into the system. As a result, administrators get very little information about attack patterns.
Firewalls are also used to filter and block suspicious requests. However, they mainly focus on prevention and do not provide detailed insights into attacker behavior. To address this issue, a honeypot system can be used. A honeypot is a dummy system designed to look like a real one and is placed between users and the actual backend server.
How to Cite this Paper
PRIYA, A., BHARATH, I., KIRAN, P. & SWARANALATHA, G. (2026). Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.336
PRIYA, A.VISHNU, et al.. "Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.336.
PRIYA, A.VISHNU,I.Y BHARATH,P.SAI KIRAN, and G. SWARANALATHA. "Honey Cloud: A Honeypot Network Approach for Enhanced Security to the Cloud." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.336.
References
Lance Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, 2003.Jyatiti Mokube and Michele Adams,
Honeypots: Concepts, Approaches, and Challenges, Proceedings of the 45th Annual Southeast Regional Conference, 2007.
Karthik Sadasivam, Banuprasad Samudrala, and T. Andrew Yang,
Design of Network Security Projects Using Honeypots, Journal of Computing Sciences in Colleges.
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou,
Ensuring Data Storage Security in Cloud Computing, IEEE International Workshop on Quality of Service, 2009.
Balachandra Reddy Kandukuri, Ramya Paturi, and Atanu Rakshit,
Cloud Security Issues, IEEE International Conference on Services Computing, 2009.
Abdul Elminaam, Mohamed Kader, and Mohamed Hadhoud,
Performance Evaluation of Symmetric Encryption Algorithms, International Journal of Network Security.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 13 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

