The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Video content consumption has been on a dramatic rise for many years now. More consumers are watching videos on online content portals than television than ever before. This trend is expected to continue far into the future. Methods: Algorithms that crowd-source popular content can be hosted on the cloud and accessed by anyone to make this process significantly easier. At the same time, a cloud based application such as this is prone to malicious attacks and vulnerabilities. Findings: In such a scenario, it becomes imperative to reduce the time taken to find the right content to watch, and automate this process based on the content’s popularity and genre. Applications: To secure the service, a dynamic honeypot can be constructed. A Dynamic Honeypot allows unauthorized access to systems, thereby allowing us to learn the methods employed by the attackers and protect against them in the future, without causing damage to the system. Additionally, a rate Limiter can also be implemented to restrict the number of requests made to the service within a specific time frame. This is done to limit and avoid malicious attacks such as DDoS.

Keywords

Cloud Security, Honeypot, Leaky Bucket Algorithm, Rate Limiter.
User