An implementation of honeypots in a cloud environment for analyzing attacks on websites

K. S. Vishal, Sarthak Chauhan, K. Krishna Prakasha

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.

Original languageEnglish
Pages (from-to)6208-6214
Number of pages7
JournalJournal of Engineering and Applied Sciences
Volume12
Issue numberSpecialissue2
DOIs
Publication statusPublished - 01-01-2017

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'An implementation of honeypots in a cloud environment for analyzing attacks on websites'. Together they form a unique fingerprint.

Cite this