Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

"In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and ""trap"" people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot. Furthermore Research paper includes the comparison between intrusion detection system and honeypot mechanism. "

Authors and Affiliations

Keywords

Related Articles

A Novel Approach for the Analysis & Issues of IPsec VPN

Virtual Private Network is the technology to setup a private network in the public network. It is broadly accepted technology for corporate world for strengthen their business. A VPN connection can be represent as a pip...

Use of Bamboo as Building Material

The existence of wood is continuously reducing, mostly in tropical. In whole world at hot and dense divisions bamboo has a long and well-established habit for building material. So it is essential to aware about its ne...

Analysis of Power Control Mechanisms of MAC Protocol for wireless Sensor Networks

Analysis of Power Control Mechanisms of MAC Protocol for wireless Sensor Networks

Real Time Corrected Background Weighted Histogram Based Mean Shift Tracking

Abstract: The real time target tracking provides the capability for the user to choose object s/he want to track as it moves in real time. The Corrected Background Weighted Histogram (CBWH) based mean shift Tracking is u...

Factors Influencing Impulse Buying of Algerian Shoppers

Impulse buying is of strategic importance to distributors. Currently, distribution companies rely heavily on contextual variables (music, smells, colors, sound, design ...) in order to push customers towards purchase and...

Download PDF file
  • EP ID EP357300
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

(2015). Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357300