Implementation of Honeypots

Authors

  • Vishal Bankar Students of Separtment of Computer Engineering, Sau. Sundarbai Manik Adsul Poly Chas, Ahmednagar
  • Suvarna Zinjurke Students of Separtment of Computer Engineering, Sau. Sundarbai Manik Adsul Poly Chas, Ahmednagar
  • Akshay A. Somwanshi Department of Computer Engineering Sau. Sundarbai Manik Adsul Poly Chas, Ahmednagar

Abstract

Providing security to the server data is the greatest challenge. Security activities range from keeping intruders out of the network or system, preventing the interception of information sent via the Internet and damage caused by computer viruses. Countermeasures are developed to detect or prevent attacks. Most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism. But they are not able to gather much information about attackers. An Intrusion Detection System (IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations. Then it produces reports to a Management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. The main problem with current intrusion detection systems is high rate of false alarms. Use of honeypots provides effective solution to increase the security and reliability of the network. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users.

Downloads

Published

2021-02-18

Issue

Section

Articles

How to Cite

Implementation of Honeypots. (2021). JournalNX - A Multidisciplinary Peer Reviewed Journal, 270-273. https://repo.journalnx.com/index.php/nx/article/view/1937