Data Security Using Honeypot
Author(s):
Manish Kala, Tushar Kanti Mandal, Rohit Upadhayay, Sumit Joshi
Keywords:
Honeypot,Types of honeypot,Advantage,Disadvantage,Proposed System,Honeynet,Conclusion
Abstract
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.
Article Details
Unique Paper ID: 144385

Publication Volume & Issue: Volume 3, Issue 11

Page(s): 49 - 54
Article Preview & Download




Go To Issue



Call For Paper

Volume 4 Issue 5

Last Date 25 October 2017


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Contact Details

Telephone:704 821 9842/43
Email: editor@ijirt.org
Website: ijirt.org