Visible to the public The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks

TitleThe Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks
Publication TypeConference Paper
Year of Publication2021
AuthorsShyla, Shyla, Bhatnagar, Vishal
Conference Name2021 11th International Conference on Cloud Computing, Data Science Engineering (Confluence)
Date Publishedjan
KeywordsComputer hacking, honey pots, honeynet, honeypots, human factors, Intrusion Detection Systems, MIMICs, Protocols, pubcrawl, python, resilience, Resiliency, Scalability, security, Servers, smart devices, web services
AbstractThe extensive utilization of network by smart devices, computers and servers makes it vulnerable to malicious activities where intruders and attackers tends to violate system security policies and authenticity to slither essential information. Honeypots are designed to create a virtual trap against hackers. The trap is to attract intruders and gather information about attackers and attack features. Honeypots mimics as a computer application, billing systems, webpages and client server-based applications to understand attackers behavior by gathering attack features and common foot prints used by hackers to forge information. In this papers, authors analyse amazon web services honeypot (AWSH) data to determine geo-spatial distribution of targeted attacks originated from different locations. The categorization of attacks is made on the basis of internet protocols and frequency of attack occurrences worldwide.
DOI10.1109/Confluence51648.2021.9377145
Citation Keyshyla_geo-spatial_2021