How feasible is a distributed honeypot deployment in the cloud?

Winckles, Adrian and Clary, Simon (2016) How feasible is a distributed honeypot deployment in the cloud? TR Media Ltd, Digital Forensics Magazine Issue 28 August 2016.

Published Version
Available under the following license: Creative Commons Attribution Non-commercial No Derivatives.

Download (4MB) | Preview
Official URL:


The rapid growth of the Internet over recent years has had a revolutionary effect on many areas of society, but this growth has also been combined with a growth of cybercrime and the spread of malware. Researchers have spent a considerable amount of time and resources trying to study the ways malware is distributed and one common technique of research is through the deployment of honeypots. Honeypots are passive systems set up with a number of sensors in order to monitor any activity with and within the system. In the past honeypot deployment has been restricted by the amount of system resources available, but developments in cloud computing has potentially made the deployment of honeypots at a wider scale far easier and more economical. The study has sought to determine how feasible it is to deploy a group of honeypots in the cloud and what sort of valuable information such a deployment can obtain to aid in the fight against cybercrime. This paper demonstrates that although there are limitations, it is feasible to deploy a wide range of honeypots in the cloud which can obtain valuable information about threats to Linux, Windows and web server systems.

Item Type: Other
Additional Information: Archived with permission from Digital Forensics Magazine:
Keywords: Honeypot, Cloud, Threat Intelligence, Cyber Security, Deployment, Malware, Botnet
Faculty: ARCHIVED Faculty of Science & Technology (until September 2018)
Depositing User: Mr Adrian Winckles
Date Deposited: 19 Oct 2016 06:46
Last Modified: 09 Sep 2021 19:00

Actions (login required)

Edit Item Edit Item