A survey on the approaches in honeypot for implementing network security
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10
Abstract
Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.
Authors and Affiliations
Niharika Srivastava , Ved Prakash
CREATION OF INTEGRATED RURAL DEVELOPMENT INFORMATION SYSTEM USING REMOTESENSING AND GIS - A MODAL STUDY ON PRAKASAM DISTRICT, A.P
The present study deals with application of Information Technology for Integrating Rural development by preparing a model for Prakasam district. This study considers the modal study area as Racherla Mandal in Markapur di...
A review on various methods of image thresholding
Recent years have witnessed the rapid growth of degraded images due to the increasing power of Computing and the fast development of Internet. Because of this tremendous increase of quality of degraded images, there is a...
Design and Implementation of a Three Dimensional CNC Machine
This paper discusses the design and implementation of low cost three dimensional computerized numerical control (CNC) machines for Industrial application. The primary function of this microcontroller based CNC machine is...
Context Ontology Construction For Cricket Video
Content based video retrieval systems are not complete in semantic sense. To improve the efficiency and the effectiveness of the retrieval system the content based retrieval systems must be equipped with the semantic bas...
Direct Processor Access for Non Dedicated Server using Multi Core Processor
The objective of the paper is to design a co processor for a desktop machine which enables the machine to act as non dedicated server, such that the co processor will act as a server processor and the multi-core processo...