Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.
Keywords: honeypot, IDS, firewall, security tools, network security
Edition: Volume 4 Issue 3, March 2015
Pages: 1440 - 1445
How to Cite this Article?
Snehal B Rase, Pranjali Deshmukh, "Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152332, Volume 4 Issue 3, March 2015, 1440 - 1445
Similar Articles with Keyword 'honeypot'
Prevention of Mobile Botnet in VPN
Sukhwinder Singh, Navdeep Kaur
Honeypots: Approach and Implementation
Kumar Shridhar, Mayank Jain
Similar Articles with Keyword 'IDS'
A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Effective Approach for Localizing Jammers in Wireless Sensor Network
Ashwini S. Chimankar, V. S. Nandedkar
Similar Articles with Keyword 'firewall'
Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
Similar Articles with Keyword 'security tools'
A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks
Supriya Gupta, Ankur Goyal
Decision Support System for Selection and Ranking Security Alternatives
Khaled Abdulkareem Alenezi, Imad Fakhri Al-Shaikhli, Sufyan Salim Mahmood AlDabbagh, Tami Alzabi
Similar Articles with Keyword 'network security'
Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra, K. Raghavendra Rao