ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Advanced Honey pot Architecture for Network Threats Quantification

Journal: International Journal of Computer Techniques (Vol.4, No. 1)

Publication Date:

Authors : ;

Page : 23-28

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Today internet security is a serious problem. For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions honeypots are a novel approach to network security and security research alike. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Honeypots is an additional layer of security. Honeypots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running on the system. The levels of interaction determines the amount of functionality a honeypots provides that is low and high interactions.

Last modified: 2017-12-12 12:47:58