This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Honeypot: Concepts, Types and Working
Authors
  Maitri Shukla,  Pranav Verma
Abstract
In couple of decades number of attacks on IT organization has increased. Among them small and medium sized organization’s risk is higher because of lower security architecture in their system. Attackers use SQL injection and XSS type of attacks to exploit the vulnerability of the system or the organization. A mechanism which is created to learn about the attackers’ method of attack and pattern and also used to get useful information about the intrusive activity is Honeypot. Honeypots can be classified according to the level of interaction as low-interaction, medium-interaction, high-interaction and the purposed for which it is used as research honeypot and production honeypot. Detailed study about the types of honeypot is included in this paper. Various honeypot results are enlisted in this paper to show that how honeypot works in real-time environment and how it responds when any unwanted activity occurs in the network.
Keywords- Network security, Honeypot, Intrusion-detection, Types of Honeypot, Honeynet.
Publication Details
Unique Identification Number - IJEDR1504100Page Number(s) - 596-598Pubished in - Volume 3 | Issue 4 | December 2015DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Maitri Shukla,  Pranav Verma,   "Honeypot: Concepts, Types and Working", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.3, Issue 4, pp.596-598, December 2015, Available at :http://www.ijedr.org/papers/IJEDR1504100.pdf
Article Preview
|
|
||||||
|