Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

HONEYPOT:Network Security


Affiliations
1 Park College of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Network forensics is basically used to detect attacker activity and to analyze their behavior. Data collection is the major task of network forensics and honeypots are used in network forensics to collect useful data. Honeypot is an exciting new technology with enormous potential for security communities. This review paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them. Research Paper also discuss about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network. Furthermore, paper reveals about the different kind of honeypots their level of interaction and risks associated with them.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 161

PDF Views: 3




  • HONEYPOT:Network Security

Abstract Views: 161  |  PDF Views: 3

Authors

A. Dayana
Park College of Technology, Coimbatore, India
S. Saranya
Park College of Technology, Coimbatore, India
B. Geethamani
Park College of Technology, Coimbatore, India
R. Kashturi
Park College of Technology, Coimbatore, India

Abstract


Network forensics is basically used to detect attacker activity and to analyze their behavior. Data collection is the major task of network forensics and honeypots are used in network forensics to collect useful data. Honeypot is an exciting new technology with enormous potential for security communities. This review paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them. Research Paper also discuss about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network. Furthermore, paper reveals about the different kind of honeypots their level of interaction and risks associated with them.