Downloads: 110 | Views: 390
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.4 / 10
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Abstract: In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.
Keywords: honeypot, IDS, firewall, security tools, network security
Edition: Volume 4 Issue 3, March 2015
Pages: 1440 - 1445
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023
Pages: 2074 - 2078DevSecOps: Integrating Security into the DevOps Pipeline
Dinesh Reddy Chittibala
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur