ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Data Security using Honeypot System

Journal: International Journal of Trend in Scientific Research and Development (Vol.4, No. 6)

Publication Date:

Authors : ;

Page : 576-578

Keywords : datasecurity; honeypot; ids; firewall;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The internet and computer technology are widely used today to make rapid progress. The increasing use of the internet and computers has led to an increase in information theft attacks. This type of honey pot is used in internet and computer field. This is a great option to use to catch an attack. Records disruptive data at the time of hacking and attacks trades outside the network framework. It can be sent for removal and capture from the attackers genuine targets. In this paper the different types of honey pot and in addition the use of conceivable arrangements in a productive environment is simplye described honeypot is a set of dynamic resistive clamps for safety arrangements. It does not interfere, it keeps a record of the honeypot hacking process tools and the movement of different types of new hacking. Honeypots are used either inside or outside the firewall to determine the process of the interloper and the vulnerabilities within the genuine authentic framework. Rupesh Ananda Mote | Kirti Mule "Data Security using Honeypot System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33418.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/33418/data-security-using-honeypot-system/rupesh-ananda-mote

Last modified: 2020-11-20 15:31:32