Visible to the public Biblio

Filters: Author is Bhatnagar, Vishal  [Clear All Filters]
2022-06-09
Shyla, Shyla, Bhatnagar, Vishal.  2021.  The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks. 2021 11th International Conference on Cloud Computing, Data Science Engineering (Confluence). :600–604.
The extensive utilization of network by smart devices, computers and servers makes it vulnerable to malicious activities where intruders and attackers tends to violate system security policies and authenticity to slither essential information. Honeypots are designed to create a virtual trap against hackers. The trap is to attract intruders and gather information about attackers and attack features. Honeypots mimics as a computer application, billing systems, webpages and client server-based applications to understand attackers behavior by gathering attack features and common foot prints used by hackers to forge information. In this papers, authors analyse amazon web services honeypot (AWSH) data to determine geo-spatial distribution of targeted attacks originated from different locations. The categorization of attacks is made on the basis of internet protocols and frequency of attack occurrences worldwide.