LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Winckles, Adrian; Clary, Simon (2016)
Publisher: TR Media Ltd
Languages: English
Types: Other
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Software_OPERATINGSYSTEMS
The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of society, but this growth has also been combined with a growth of cybercrime and the spread of malware. Researchers have spent a considerable amount of time and resources trying to study the ways malware is distributed and one common technique of research is through the deployment of honeypots.\ud \ud Honeypots are passive systems set up with a number of sensors in order to monitor any activity with and within the system. In the past honeypot deployment has been restricted by the amount of system resources available, but developments in cloud computing has potentially made the deployment of honeypots at a wider scale far easier and more economical. The study has sought to determine how feasible it is to deploy a group of honeypots in the cloud and what sort of valuable information such a deployment can obtain to aid in the fight against cybercrime.\ud \ud This paper demonstrates that although there are limitations, it is feasible to deploy a wide range of honeypots in the cloud which can obtain valuable information about threats to Linux, Windows and web server systems.
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article