Information precautions using intellectual honeypot instrument
Publish Year: 1391
Type: Journal paper
Language: English
View: 477
This Paper With 6 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_SJPAS-1-3_009
Index date: 6 December 2015
Information precautions using intellectual honeypot instrument abstract
A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. Thishas led to growing interest in more aggressive forms of defence tosupplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.
Information precautions using intellectual honeypot instrument Keywords:
Information precautions using intellectual honeypot instrument authors
L.S Arul
Director-CA, T.John College, Bangalore, India.
k Lecturer
T.John College, Bangalore, India.