Secure File Storage System with Instruction Detection & Deception Mechanism
International Journal of Computer Techniques β Volume 12 Issue 3, May – June – 2025
Authors
Rudhra Swathi .M – M.Sc. Criminology and Forensic Science, Dr. M.G.R. Education and Research Institute, Chennai. rudhraswathi1@gmail.com
Marimuthu .R – Centre for Cyber Forensics and Information Security, University of Madras, Chennai.
Abstract
The proposed system integrates **advanced intrusion detection** and **deception mechanisms** within a **secure file storage environment** to enhance cybersecurity and minimize threats. Using both signature-based and anomaly-based detection techniques, the system ensures real-time monitoring and proactive security measures.
By integrating **Intrusion Detection Systems (IDS)** and **Deception Mechanisms**, this research highlights an innovative approach to secure file storage. The **use of decoy files** and **proactive threat detection** ensures enhanced cybersecurity and mitigates unauthorized access risks.
References
R. Smith (2020). “Advanced Intrusion Detection Systems.” IEEE Security.
A. Jones et al. (2021). “Decoy Technology in Data Protection.” Journal of Cyber Defence.
Post Comment