Data Security Using Honeypot

  • Unique Paper ID: 144385
  • PageNo: 49-54
  • Abstract:
  • With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144385,
        author = {Manish Kala and Tushar Kanti Mandal and Rohit Upadhayay and Sumit Joshi},
        title = {Data Security Using Honeypot},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {11},
        pages = {49-54},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144385},
        abstract = {With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach.Honeypot is an new technology with enormous potential for security communities. Honey pot offers a wealth of features that can assist with intelligence data gathering, incident response for a better understanding of who the attacker is, what method the attacker used to gain access and the results of the attacker’s unauthorized attack for possible prosecution measures.This paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them.Finally we shall conclude by looking at what the future holds for honeypots.},
        keywords = {Honeypot,Types of honeypot,Advantage,Disadvantage,Proposed System,Honeynet,Conclusion},
        month = {},
        }

Cite This Article

Kala, M., & Mandal, T. K., & Upadhayay, R., & Joshi, S. (). Data Security Using Honeypot. International Journal of Innovative Research in Technology (IJIRT), 3(11), 49–54.

Related Articles