Manish Kala, Tushar Kanti Mandal, Rohit Upadhayay, Sumit Joshi
Keywords:
Honeypot,Types of honeypot,Advantage,Disadvantage,Proposed System,Honeynet,Conclusion
Abstract
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.
Article Details
Unique Paper ID: 144385
Publication Volume & Issue: Volume 3, Issue 11
Page(s): 49 - 54
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024