IDENTIFICATION OF ATTACKERS BY USING SECURITY SERVICES OF HONEYPOT
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 10)Publication Date: 2015-10-30
Authors : Dinesh S. Kapse; Vijay Bagdi;
Page : 526-530
Keywords : Internet;
Abstract
Internet security is vital issue recently. it is necessary to protect our assets or valuable data from unauthorized person. There are number of techniques are available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victim’s site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not gives the vital information to the unauthorized person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker.In this paper the brief introduction of honeypots and the types and its uses are described. And also paper this paper would give introduction about Kerberos finally we shall conclude by looking at the future of honeypot using Kerberos
Other Latest Articles
- MEDICAL IMAGE COMPRESSION USING ANAMORPHIC STRETCH TRANSFORM
- Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
- Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
- An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
Last modified: 2015-10-28 11:36:48