Downloads: 121 | Views: 198
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Honeypots: Approach and Implementation
Kumar Shridhar [3] | Mayank Jain [2]
Abstract: Global communication is getting more important every day. At the same time, computer crimes are increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. By knowing attack strategies countermeasures can be improved and vulnerabilities can be fixed. Honeypot comes into play for such purposes. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology.
Keywords: Honeypots, Network attack, N-Map, DMZ, Network Security
Edition: Volume 3 Issue 12, December 2014,
Pages: 1038 - 1043
Similar Articles with Keyword 'Honeypots'
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 572 - 575Prevention of Mobile Botnet in VPN
Sukhwinder Singh [5] | Navdeep Kaur [3]
Downloads: 140
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 769 - 773A Secure Multilayer Honeypot in an E-Commerce Web Application
Gaurav Beriwal | Anuj Garg | Ravinder Jangra [2]