ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 10)

Publication Date:

Authors : ; ;

Page : 526-530

Keywords : Internet;

Source : Downloadexternal Find it from : Google Scholarexternal


Internet security is vital issue recently. it is necessary to protect our assets or valuable data from unauthorized person. There are number of techniques are available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victim’s site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not gives the vital information to the unauthorized person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker.In this paper the brief introduction of honeypots and the types and its uses are described. And also paper this paper would give introduction about Kerberos finally we shall conclude by looking at the future of honeypot using Kerberos

Last modified: 2015-10-28 11:36:48