A survey on the approaches in honeypot for implementing network security

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10

Abstract

Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.

Authors and Affiliations

Niharika Srivastava , Ved Prakash

Keywords

Related Articles

Study on the Customer targeting using Association Rule Mining

Data mining is one of the widest area where many researches takes place to mine desired and hidden data. There are many different approaches to find the hidden data. This paper deals with Frequent Pattern growth algorith...

Fast Background Subtraction from Video Sequences

This paper presents a technique to detect the moving objects quickly and accurately by using a background subtraction algorithm called FaBS (Fast Background Subtraction). The aim of FaBS is to distinguish between moving...

Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools

E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing...

Road Recognition for Vision Navigation of Robot by Using Computer Vision

This paper presents a method for vision navigation of robot by road recognition based on image processing. By taking advantages of the unique structure in road images, the square images on road can be scanned while the r...

A Fast Algorithm for Mining Multilevel Association Rule Based on Boolean Matrix

In this paper an algorithm is proposed for mining multilevel ssociation rules. A Boolean Matrix based approach has been mployed to discover frequent itemsets, the item forming a ule ome from different levels. It adop...

Download PDF file
  • EP ID EP114413
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Niharika Srivastava, Ved Prakash (2012). A survey on the approaches in honeypot for implementing network security. International Journal on Computer Science and Engineering, 4(10), 1691-1694. https://europub.co.uk/articles/-A-114413