An implementation of honeypots in a cloud environment for analyzing attacks on websites

K. S. Vishal, Sarthak Chauhan, K. Krishna Prakasha

Research output: Contribution to journalArticle

Abstract

We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.

Original languageEnglish
Pages (from-to)6208-6214
Number of pages7
JournalJournal of Engineering and Applied Sciences
Volume12
Issue numberSpecialissue2
DOIs
Publication statusPublished - 01-01-2017

Fingerprint

Websites
Network security
Blogs
Internet
Malware

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Vishal, K. S. ; Chauhan, Sarthak ; Prakasha, K. Krishna. / An implementation of honeypots in a cloud environment for analyzing attacks on websites. In: Journal of Engineering and Applied Sciences. 2017 ; Vol. 12, No. Specialissue2. pp. 6208-6214.
@article{71eb80438e764d778a25920d2f78067d,
title = "An implementation of honeypots in a cloud environment for analyzing attacks on websites",
abstract = "We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the {"}act{"} and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.",
author = "Vishal, {K. S.} and Sarthak Chauhan and Prakasha, {K. Krishna}",
year = "2017",
month = "1",
day = "1",
doi = "10.3923/jeasci.2017.6208.6214",
language = "English",
volume = "12",
pages = "6208--6214",
journal = "Journal of Engineering and Applied Sciences",
issn = "1816-949X",
publisher = "Medwell Journals",
number = "Specialissue2",

}

An implementation of honeypots in a cloud environment for analyzing attacks on websites. / Vishal, K. S.; Chauhan, Sarthak; Prakasha, K. Krishna.

In: Journal of Engineering and Applied Sciences, Vol. 12, No. Specialissue2, 01.01.2017, p. 6208-6214.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An implementation of honeypots in a cloud environment for analyzing attacks on websites

AU - Vishal, K. S.

AU - Chauhan, Sarthak

AU - Prakasha, K. Krishna

PY - 2017/1/1

Y1 - 2017/1/1

N2 - We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.

AB - We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.

UR - http://www.scopus.com/inward/record.url?scp=85038928711&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85038928711&partnerID=8YFLogxK

U2 - 10.3923/jeasci.2017.6208.6214

DO - 10.3923/jeasci.2017.6208.6214

M3 - Article

VL - 12

SP - 6208

EP - 6214

JO - Journal of Engineering and Applied Sciences

JF - Journal of Engineering and Applied Sciences

SN - 1816-949X

IS - Specialissue2

ER -