Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6208 - 6214

An Implementation of Honeypots in a Cloud Environment for Analyzing Attacks on Websites

Authors : K.S. Vishal, Sarthak Chauhan and K. Krishna Prakasha

References

Amoroso, E., 2010. Cyber Attacks: Protecting National Infrastructure. Butterworth Heinemann, Oxford, England, ISBN:978-0-12-384917-5, Pages: 233.

Chawda, K. and A.D. Patel, 2014. Dynamic and hybrid honey pot model for scalable network monitoring. Proceedings of the IEEE International Conference on Information Communication and Embedded Systems (ICICES), February 27-28, 2014, IEEE, Chennai, India, ISBN:978-1-4799-3698-4, pp: 1-5.

Dittrich, D., 2004. Creating and managing distributed honeynets using honeywalls. Master Thesis, University of Washington, Seattle, Washington.

Olagunju, A.O. and F. Samu, 2016. In search of effective honeypot and honeynet systems for real-time intrusion detection and prevention. Proceedings of the 5th Annual ACM Conference on Research in Information Technology, September 28-October 01, 2016, ACM, Boston, Massachusetts, ISBN:978-1-4503-4453-1, pp: 41-46.

PWHC., 2014. The global state of information security survey 2012. PricewaterhouseCoopers, London, England.

Polska, C., 2012. Proactive detection of security incidents: Honeypots. ENISA, Heraklion, Greece.

Spitzner, L., 2002. Honeypots: Tracking Hackers. Addison-Wesley, Boston, Massachusetts,.

Trost, J., 2017. Modern honey network via threatstream. GitHub Inc, San Francisco, California. https://github.com/threatstream/mhn

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved