Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.

Keywords: honeypot, IDS, firewall, security tools, network security

Edition: Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Share this Article

How to Cite this Article?

Snehal B Rase, Pranjali Deshmukh, "Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152332, Volume 4 Issue 3, March 2015, 1440 - 1445

76 PDF Views | 59 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'honeypot'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 562 - 565

Advance Honeypot Mechanism- The Hybrid Solution for Enhancing Computer System Security with DoS

Swapnali Sundar Sadamate, V. S. Nandedkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1672 - 1675

Deceptive Attacks and Anomalies Detection Using Honeypot Enabled Networks

Nimitha Mary Mohan, Kalimuthu M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Honeypots: Approach and Implementation

Kumar Shridhar, Mayank Jain

Share this Article

Similar Articles with Keyword 'IDS'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1787 - 1791

Document Clustering Approach for Forensic Analysis: A Survey

Prachi K. Khairkar, D. A. Phalke

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Similar Articles with Keyword 'firewall'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Similar Articles with Keyword 'security tools'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3151 - 155

A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks

Supriya Gupta, Ankur Goyal

Share this Article

Research Paper, Computer Science & Engineering, Kuwait, Volume 6 Issue 11, November 2017

Pages: 1534 - 1538

Decision Support System for Selection and Ranking Security Alternatives

Khaled Abdulkareem Alenezi, Imad Fakhri Al-Shaikhli, Sufyan Salim Mahmood AlDabbagh, Tami Alzabi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 134 - 137

Sharing Approach for Securing Transaction based on VC & TS Framework

Vasanth SVL, G. Kishore

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 414 - 418

Prevention to Cross-site Scripting Attacks: A Survey

Manisha S Mahindrakar

Share this Article

Similar Articles with Keyword 'network security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article
Top