International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.

Keywords: honeypot, IDS, firewall, security tools, network security

Edition: Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Share this Article

How to Cite this Article?

Snehal B Rase, Pranjali Deshmukh, "Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152332, Volume 4 Issue 3, March 2015, 1440 - 1445

Enter Your Email Address


Similar Articles with Keyword 'honeypot'

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Honeypots: Approach and Implementation

Kumar Shridhar, Mayank Jain

Share this Article

Similar Articles with Keyword 'IDS'

Downloads: 71

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Similar Articles with Keyword 'firewall'

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Similar Articles with Keyword 'security tools'

Downloads: 112

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3151 - 155

A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks

Supriya Gupta, Ankur Goyal

Share this Article

Downloads: 122

Research Paper, Computer Science & Engineering, Kuwait, Volume 6 Issue 11, November 2017

Pages: 1534 - 1538

Decision Support System for Selection and Ranking Security Alternatives

Khaled Abdulkareem Alenezi, Imad Fakhri Al-Shaikhli, Sufyan Salim Mahmood AlDabbagh, Tami Alzabi

Share this Article

Similar Articles with Keyword 'network security'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article
Top