Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Role of a Honeypot in Network Security – Survey


     

   Subscribe/Renew Journal


The tactics used to attack networks is increasing as the objectives of securing a network is also enormously progressing. Thus it is important to find ways to combat the threats; such a method will deeply wound over honeypots. A honeypot is a new concept that focuses on diverting hackers, malicious traffic; get a prior warning about the attack and information about the attacker and attacking methods. A honeypot is a great way to analyze, perceive, monitor and track the behavior of hacker to create more secure systems. Compared to an IDS or firewall, honeypots is an advanced technology because they do not create counterfeit alerts as each observer is suspicious of the traffic due to no productive components running on the system.

In this paper, a detailed description about honeypots, their types, advantages, and how honeypot technologies can be used to analyze and gather information on these threats is discussed.


Keywords

Honeypots, Hacking, Forensic, Interaction, Research, Security, Types of Honeypots.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 298

PDF Views: 2




  • Role of a Honeypot in Network Security – Survey

Abstract Views: 298  |  PDF Views: 2

Authors

Abstract


The tactics used to attack networks is increasing as the objectives of securing a network is also enormously progressing. Thus it is important to find ways to combat the threats; such a method will deeply wound over honeypots. A honeypot is a new concept that focuses on diverting hackers, malicious traffic; get a prior warning about the attack and information about the attacker and attacking methods. A honeypot is a great way to analyze, perceive, monitor and track the behavior of hacker to create more secure systems. Compared to an IDS or firewall, honeypots is an advanced technology because they do not create counterfeit alerts as each observer is suspicious of the traffic due to no productive components running on the system.

In this paper, a detailed description about honeypots, their types, advantages, and how honeypot technologies can be used to analyze and gather information on these threats is discussed.


Keywords


Honeypots, Hacking, Forensic, Interaction, Research, Security, Types of Honeypots.