Skip to content

The intention of this study is to comprehend the use of a honeypot system inside a cloud-based environment.

Notifications You must be signed in to change notification settings

Dushyant029/Honeypot-Implementation-in-Cloud-Environ-with-Open-Source-Medium

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Honeypot-Implementation-in-Cloud-Environ-with-Open-Source-Medium

Introduction 🔔

Honeypots can provide a valuable cybersecurity information. But is it worth the risk? A network-attached machine called a honeypot is set up as a ruse and is intended to mimic a server or other high-value asset. Its goal is to stop hacking efforts that may have otherwise resulted in illegal access to information systems. A honeypot service typically consists of a machine, apps, and records that mimic the deviance of such a profound system such a banking system or IoT devices but are entirely isolated and closely watched.

Objective 🙄

The foregoing are the research objectives for the study:

  • The perspective is to find solutions to issues with security, the use of honeypots, and the volume of data we can gather.
  • Examine the rules that apply to honeypot installation constraints, as well as how far a network security administrator can go to gather data and find the hacker, with a focus on India.
  • Need to provide explanations and generate some discussion about what should be done in accordance with the law and what shouldn't.

Technologies used 🛠️

Screenshots Walkthrough :- 📷

System Architecture Diagram

image

Honeypot System

image

AWS Instance Create

image image

Kali linux EC2 Instance

image

Kibana Dashboard

image image

Threat Tracks

image

About

The intention of this study is to comprehend the use of a honeypot system inside a cloud-based environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published