Abstract: Honeypots: Approach and Implementation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Honeypots: Approach and Implementation

Kumar Shridhar, Mayank Jain

Global communication is getting more important every day. At the same time, computer crimes are increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. By knowing attack strategies countermeasures can be improved and vulnerabilities can be fixed. Honeypot comes into play for such purposes. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. In this paper we present an overview of honeypots and provide a starting point for persons who are interested in this technology.

Keywords: Honeypots, Network attack, N-Map, DMZ, Network Security

Edition: Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Share this Article

How to Cite this Article?

Kumar Shridhar, Mayank Jain, "Honeypots: Approach and Implementation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14528, Volume 3 Issue 12, December 2014, 1038 - 1043

Enter Your Email Address


Similar Articles with Keyword 'Honeypots'

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Downloads: 140 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 769 - 773

A Secure Multilayer Honeypot in an E-Commerce Web Application

Gaurav Beriwal, Anuj Garg, Ravinder Jangra

Share this Article

Similar Articles with Keyword 'Network attack'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Similar Articles with Keyword 'Network Security'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article
Top