Paper Title :A Discussion About Honeypots And Different Models Based On Honeypots
Author :Snehil Vidwarshi, Atul Tyagi, Rishi Kumar
Article Citation :Snehil Vidwarshi ,Atul Tyagi ,Rishi Kumar ,
(2015 ) " A Discussion About Honeypots And Different Models Based On Honeypots " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 32-40,
Volume-3, Issue-8
Abstract : Honeypot is trap spread for an attacker so that his/her activities over a network could be captured and an
advanced security feature could be provided to the network. Honeypot trap the attacker in such a way that it becomes
difficult for an attacker to know that their activity are under consideration. Honeypot helps in roviding a beneficial effect on
a network security. This paper discusses about the honeypot and also provides different useful information about it. In this
paper different type of honeypots were discussed along with the history of honeypots. Paper also throws light on some of the
models which are based on honeypot. Applications, advantages and disadvantages of honeypots were also discussed. Paper
provides a complete detail description of honeypot in a beneficial way.
Keywords—Honeypot, VoIP, NetFlow Generation, Cyber Threat Monitoring System (CTMS), Medium Interaction
Honeypot.
Type : Research paper
Published : Volume-3, Issue-8
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2683
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 93 |
| |
Published on 2015-08-04 |
|