Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.
Keywords: honeypot, IDS, firewall, security tools, network security
Edition: Volume 4 Issue 3, March 2015
Pages: 1440 - 1445
How to Cite this Article?
Snehal B Rase, Pranjali Deshmukh, "Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152332, Volume 4 Issue 3, March 2015, 1440 - 1445
114 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'honeypot'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 572 - 575Prevention of Mobile Botnet in VPN
Sukhwinder Singh, Navdeep Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1038 - 1043Honeypots: Approach and Implementation
Kumar Shridhar, Mayank Jain
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018
Pages: 1672 - 1675Deceptive Attacks and Anomalies Detection Using Honeypot Enabled Networks
Nimitha Mary Mohan, Kalimuthu M
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 562 - 565Advance Honeypot Mechanism- The Hybrid Solution for Enhancing Computer System Security with DoS
Swapnali Sundar Sadamate, V. S. Nandedkar
Similar Articles with Keyword 'IDS'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2294 - 2298Effective Approach for Localizing Jammers in Wireless Sensor Network
Ashwini S. Chimankar, V. S. Nandedkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Similar Articles with Keyword 'firewall'
Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 193 - 195Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1948 - 1954A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Similar Articles with Keyword 'security tools'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3151 - 155A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks
Supriya Gupta, Ankur Goyal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 134 - 137Sharing Approach for Securing Transaction based on VC & TS Framework
Vasanth SVL, G. Kishore
Research Paper, Computer Science & Engineering, Kuwait, Volume 6 Issue 11, November 2017
Pages: 1534 - 1538Decision Support System for Selection and Ranking Security Alternatives
Khaled Abdulkareem Alenezi, Imad Fakhri Al-Shaikhli, Sufyan Salim Mahmood AlDabbagh, Tami Alzabi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 414 - 418Prevention to Cross-site Scripting Attacks: A Survey
Manisha S Mahindrakar
Similar Articles with Keyword 'network security'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1440 - 1445Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016
Pages: 1112 - 1116Network Security Mechanism Based On Static Internet Protocol Addressing
Ahmed D. Asad
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1065 - 1069Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network
Jitendra R. Patil, Manish Sharma