Implementation of a Honey Pot Security Mechanism on a Raspberry Pi
Author(s):
Ayush R, M. Baskar , M. Sri Vishnu Vardhan
Keywords:
honey pot; raspberry pi; security; unauthorized access; low interaction
Abstract
In the modern day, most of the enterprises have decided to move their services to a web based system which is more convenient and easily accessible to all the customers. With the advent of Internet of Things, several thousand more devices transmit data through the internet to perform various tasks that optimize our issues. These devices can provide a possible security loophole for unauthorized or illegal access. These peripheral devices that transmit data over a network and this security loophole is what we plan to address by implementing a honey pot mechanism on these very devices and neutralise any intrusion attempts through these access points. This paper in essence discusses a possible mechanism to deal with the security threats that are evolving due to the internet of things.
Article Details
Unique Paper ID: 144364

Publication Volume & Issue: Volume 3, Issue 10

Page(s): 238 - 240
Article Preview & Download


Share This Article

Conference Alert

NCSST-2021

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2021

Go To Issue



Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies