International Journal of Computer Techniques Volume 12 Issue 3 | SECURE FILE STORAGE SYSTEM WITH INSTRUCTION DETECTION & DECEPTION MECHANISM

Secure File Storage System with Instruction Detection & Deception Mechanism

Secure File Storage System with Instruction Detection & Deception Mechanism

International Journal of Computer Techniques – Volume 12 Issue 3, May – June – 2025

Authors

Rudhra Swathi .M – M.Sc. Criminology and Forensic Science, Dr. M.G.R. Education and Research Institute, Chennai. rudhraswathi1@gmail.com

Marimuthu .R – Centre for Cyber Forensics and Information Security, University of Madras, Chennai.

Abstract

The proposed system integrates **advanced intrusion detection** and **deception mechanisms** within a **secure file storage environment** to enhance cybersecurity and minimize threats. Using both signature-based and anomaly-based detection techniques, the system ensures real-time monitoring and proactive security measures.

Keywords

Secure file storage, Cybersecurity, Intrusion Detection System, Deception Mechanism, NLP, Data protection, Document deception.

Conclusion

By integrating **Intrusion Detection Systems (IDS)** and **Deception Mechanisms**, this research highlights an innovative approach to secure file storage. The **use of decoy files** and **proactive threat detection** ensures enhanced cybersecurity and mitigates unauthorized access risks.

References

  1. R. Smith (2020). “Advanced Intrusion Detection Systems.” IEEE Security.
  2. A. Jones et al. (2021). “Decoy Technology in Data Protection.” Journal of Cyber Defence.
  3. Microsoft Docs (2023). “ASP.NET MVC Framework.”

Post Comment