An implementation of honeypots in a cloud environment for analyzing attacks on websites

K. S. Vishal, Sarthak Chauhan, K. Krishna Prakasha

Research output: Contribution to journalArticle


We deploy honeypots over the cloud to gather information and analyse the attacks that try to illegitimately access websites. The methods and the malware used to attack websites has been continuously evolving, never has the need for good network security been more apparent than it is now. With multiple kinds of 0 day exploits and more attackers than ever before deploying honeypots will be an essential part of any network security setup due to their potential for catching attackers in the "act" and to find out who the attacker is. With honeypots we have a way to observe the malware that attackers use and isolate it before it can harm the system. In this study, we setup a wordpress blog website and gather information then analyze this data to gain insights about the current threats in the world of internet security.

Original languageEnglish
Pages (from-to)6208-6214
Number of pages7
JournalJournal of Engineering and Applied Sciences
Issue numberSpecialissue2
Publication statusPublished - 01-01-2017


All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this