Data Security Using Honeypot
Author(s):
Manish Kala, Tushar Kanti Mandal, Rohit Upadhayay, Sumit Joshi
Keywords:
Honeypot,Types of honeypot,Advantage,Disadvantage,Proposed System,Honeynet,Conclusion
Abstract
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.
Article Details
Unique Paper ID: 144385

Publication Volume & Issue: Volume 3, Issue 11

Page(s): 49 - 54
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews