International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7,Issue-11  ( Nov, 2019 )
Past issues
  1. Volume-7, Issue-10  ( Oct, 2019 )
  2. Volume-7, Issue-9  ( Sep, 2019 )
  3. Volume-7, Issue-8  ( Aug, 2019 )
  4. Volume-7, Issue-7  ( Jul, 2019 )
  5. Volume-7, Issue-6  ( Jun, 2019 )
  6. Volume-7, Issue-5  ( May, 2019 )
  7. Volume-7, Issue-4  ( Apr, 2019 )
  8. Volume-7, Issue-3  ( Mar, 2019 )
  9. Volume-7, Issue-2  ( Feb, 2019 )
  10. Volume-7, Issue-1  ( Jan, 2019 )

Statistics report
Jan. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 82
Paper Published : 1209
No. of Authors : 3038
  Journal Paper

Paper Title
A Discussion About Honeypots And Different Models Based On Honeypots

Abstract
Honeypot is trap spread for an attacker so that his/her activities over a network could be captured and an advanced security feature could be provided to the network. Honeypot trap the attacker in such a way that it becomes difficult for an attacker to know that their activity are under consideration. Honeypot helps in roviding a beneficial effect on a network security. This paper discusses about the honeypot and also provides different useful information about it. In this paper different type of honeypots were discussed along with the history of honeypots. Paper also throws light on some of the models which are based on honeypot. Applications, advantages and disadvantages of honeypots were also discussed. Paper provides a complete detail description of honeypot in a beneficial way. Keywords—Honeypot, VoIP, NetFlow Generation, Cyber Threat Monitoring System (CTMS), Medium Interaction Honeypot.


Author - Snehil Vidwarshi, Atul Tyagi, Rishi Kumar

| PDF |
Viewed - 84
| Published on 2015-08-04
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY