سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Information precautions using intellectual honeypot instrument

Publish Year: 1391
Type: Journal paper
Language: English
View: 477

This Paper With 6 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

JR_SJPAS-1-3_009

Index date: 6 December 2015

Information precautions using intellectual honeypot instrument abstract

A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. Thishas led to growing interest in more aggressive forms of defence tosupplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.

Information precautions using intellectual honeypot instrument authors

L.S Arul

Director-CA, T.John College, Bangalore, India.

k Lecturer

T.John College, Bangalore, India.