Data Security Using Honeypot
Manish Kala, Tushar Kanti Mandal, Rohit Upadhayay, Sumit Joshi
Honeypot,Types of honeypot,Advantage,Disadvantage,Proposed System,Honeynet,Conclusion
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.
Article Details
Unique Paper ID: 144385

Publication Volume & Issue: Volume 3, Issue 11

Page(s): 49 - 54
Article Preview & Download

Share This Article

Go To Issue

Call For Paper

Volume 7 Issue 9

Last Date 25 February 2020

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews

Contact Details