A survey on the approaches in honeypot for implementing network security

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10

Abstract

Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.

Authors and Affiliations

Niharika Srivastava , Ved Prakash

Keywords

Related Articles

CREATION OF INTEGRATED RURAL DEVELOPMENT INFORMATION SYSTEM USING REMOTESENSING AND GIS - A MODAL STUDY ON PRAKASAM DISTRICT, A.P

The present study deals with application of Information Technology for Integrating Rural development by preparing a model for Prakasam district. This study considers the modal study area as Racherla Mandal in Markapur di...

A review on various methods of image thresholding

Recent years have witnessed the rapid growth of degraded images due to the increasing power of Computing and the fast development of Internet. Because of this tremendous increase of quality of degraded images, there is a...

Design and Implementation of a Three Dimensional CNC Machine

This paper discusses the design and implementation of low cost three dimensional computerized numerical control (CNC) machines for Industrial application. The primary function of this microcontroller based CNC machine is...

Context Ontology Construction For Cricket Video

Content based video retrieval systems are not complete in semantic sense. To improve the efficiency and the effectiveness of the retrieval system the content based retrieval systems must be equipped with the semantic bas...

Direct Processor Access for Non Dedicated Server using Multi Core Processor

The objective of the paper is to design a co processor for a desktop machine which enables the machine to act as non dedicated server, such that the co processor will act as a server processor and the multi-core processo...

Download PDF file
  • EP ID EP114413
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Niharika Srivastava, Ved Prakash (2012). A survey on the approaches in honeypot for implementing network security. International Journal on Computer Science and Engineering, 4(10), 1691-1694. https://europub.co.uk/articles/-A-114413