Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Snehal B Rase; Pranjali Deshmukh;
Page : 1440-1445
Keywords : honeypot; IDS; firewall; security tools; network security;
Abstract
In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism.
Other Latest Articles
- On a New Subclass of Meromorphic Univalent Functions Defined by Integral Operator
- Modeling and Analysis of Human Liver by Using Finite Element Analysis
- An Investigation about the Effect of UV-Ray on Activity of Laccase and Manganese Peroxidase in Pleurotus Florida Shell Fungus
- Reducing Semantic Gap in Image Retrieval by Integrating High Level Query and Low Level Facial Features
- A Comparison of Transverse Section with Arc Shaped Turbulators as an Artificial Roughness on the Absorber Plate of a Solar Air Heater
Last modified: 2021-06-30 21:34:49