Advanced Honey pot Architecture for Network Threats Quantification
Journal: International Journal of Computer Techniques (Vol.4, No. 1)Publication Date: 2017-01-01
Authors : - Karthikeyan R Dr.T.Geetha Shyamamol K.S Sivagami G;
Page : 23-28
Keywords : ;
Abstract
Today internet security is a serious problem. For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions honeypots are a novel approach to network security and security research alike. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Honeypots is an additional layer of security. Honeypots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running on the system. The levels of interaction determines the amount of functionality a honeypots provides that is low and high interactions.
Other Latest Articles
- Estimating Driving Behavior by a Smart Phone
- Efficient Streaming Data Analysis using Big Data tools
- Analysis and diagnosis of polycoherence based ECG signal for non-linearity detection
- Performance Evaluation of Digital Modulation Schemes BPSK, QPSK & QAM
- Performance of a 4- switch, 3-phase inverter fed induction motor (IM) drive system using MATLAB
Last modified: 2017-12-12 12:47:58