International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase | Pranjali Deshmukh [2]


Abstract: In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.


Keywords: honeypot, IDS, firewall, security tools, network security


Edition: Volume 4 Issue 3, March 2015,


Pages: 1440 - 1445


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Snehal B Rase, Pranjali Deshmukh, "Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1440-1445, https://www.ijsr.net/get_abstract.php?paper_id=SUB152332

Similar Articles with Keyword 'honeypot'

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh [7] | Navdeep Kaur [4]

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Honeypots: Approach and Implementation

Kumar Shridhar [3] | Mayank Jain [2]

Share this Article
Top