We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.
All Science Journal Classification (ASJC) codes