Downloads: 121 | Views: 376
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.1 / 10
Honeypots: Approach and Implementation
Kumar Shridhar, Mayank Jain
Abstract: Global communication is getting more important every day. At the same time, computer crimes are increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. By knowing attack strategies countermeasures can be improved and vulnerabilities can be fixed. Honeypot comes into play for such purposes. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology.
Keywords: Honeypots, Network attack, N-Map, DMZ, Network Security
Edition: Volume 3 Issue 12, December 2014
Pages: 1038 - 1043
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V