Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i37/102083
Year: 2016, Volume: 9, Issue: 37, Pages: 1-4
Original Article
R. Mangalagowri1 * and Shashank Bhardwaj2
1 Department of Computer Science, SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, India; [email protected]
[email protected]
*Author for correspondence
Mangalagowri
Department of Computer Science
Email: [email protected]
Objectives: Video content consumption has been on a dramatic rise for many years now. More consumers are watching videos on online content portals than television than ever before. This trend is expected to continue far into the future. Methods: Algorithms that crowd-source popular content can be hosted on the cloud and accessed by anyone to make this process significantly easier. At the same time, a cloud based application such as this is prone to malicious attacks and vulnerabilities. Findings: In such a scenario, it becomes imperative to reduce the time taken to find the right content to watch, and automate this process based on the content’s popularity and genre. Applications: To secure the service, a dynamic honeypot can be constructed. A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system. Additionally, a rate Limiter can also be implemented to restrict the number of requests made to the service within a specific time frame. This is done to limit and avoid malicious attacks such as DDoS.
Keywords: Cloud Security, Honeypot, Leaky Bucket Algorithm, Rate Limiter,
Subscribe now for latest articles and news.