Honey pot based new algorithm for data security
Journal Title: International Journal of engineering Research and Applications - Year 2018, Vol 8, Issue 12
Abstract
Cloud computing an emerging technology provides various services to the users like infrastructure, hardware, software, storage etc. So, it is necessary that cloud computing network should always free from attack. Various strict security checking systems are used for making network bugs free and honey pot is among one of the tool that is used to provide security. Various models are proposed for honey pot to solve the problem of industries and that is used to captures the activities of attackers and maintains a log for providing better security to the cloud network. Here in this paper we proposed an algorithm to resolve some of the issues of network security.
Authors and Affiliations
Apurva Saxena, Dr. Pratima Gautam, Dr. Anubha Dubey
Handwriting Identification By Using Neuro Fuzzy Methods Based On Features Extraction
Handwriting recognition system is a system to recognize one's writing through paper. This technology identifies a unique and fixed piece of writing like human handwriting. The character pattern recognition on human handw...
Wireless Sensor Network and Its Security Threats – A Study
A data network is a digital telecommunications network that allows nodes to share resources. Two types of networks are available, wired and wireless networks. Wireless networks become popular because of its wireless setu...
Design Of A Sand Casting Method Using Patterns Made Of Sublime Materials For Casting Intricate Shapes.
In today’s world every product ranging from a safety pin to huge complex aircraft engines are all manufactured by various manufacturing techniques. It involves various processes like casting, forming, machining, welding...
Reduction and Management of Waste in Hotel Industries
The present review article is trying to compile the available information from literature on reduction and management of waste in the hotel industries. As per the available literature, 5 Rs Transition Strategy is good fo...
Interpolation of Stock market Data with Fuzzy Conception Using Weka Tool
Progressing growth of IT has brought rapid technological advancement. Technologies are getting advance at an exponential rate and hence massive amount of data is emerging at very enormous rate in different sector. So the...