A survey on the approaches in honeypot for implementing network security

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10

Abstract

Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques from attackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.

Authors and Affiliations

Niharika Srivastava , Ved Prakash

Keywords

Related Articles

Content Aware Media Retargeting for still images using Seam Carving

When changing height and width of image traditional techniques for image resizing are oblivious to the content of image. A simple operator seam carving is used for image and video retargeting. This seam carving operator...

Drag and Drop: Influences on the Design of Reusable Software Components

The fundamental unit of large scale software construction is he component. A component is the fundamental user interface object in Java. Everything you see on the display in a java pplication is a component. The abilit...

Trust Based Security Routing in Mobile Adhoc Networks

Abstract: Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure...

Secure Web Service Using Call by Contract

A methodology for designing and composing services in a ecure manner. In particular, it’s concerned with safety roperties of service behavior. Services can enforce security olicies locally and can invoke other service...

Integration of Web mining and web crawler: Relevance and State of Art

This study presents the role of web crawler in web mining environment. As the growth of the World Wide Web exceeded all expectations,the research on Web mining is growing more and more.web mining research topic which com...

Download PDF file
  • EP ID EP114413
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Niharika Srivastava, Ved Prakash (2012). A survey on the approaches in honeypot for implementing network security. International Journal on Computer Science and Engineering, 4(10), 1691-1694. https://europub.co.uk/articles/-A-114413