Implementation of Honeypots

Main Article Content

Vishal Bankar
Suvarna Zinjurke
Akshay A. Somwanshi

Abstract

Providing security to the server data is the greatest challenge. Security activities range from keeping intruders out of the network or system, preventing the interception of information sent via the Internet and damage caused by computer viruses. Countermeasures are developed to detect or prevent attacks. Most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism. But they are not able to gather much information about attackers. An Intrusion Detection System (IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations. Then it produces reports to a Management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. The main problem with current intrusion detection systems is high rate of false alarms. Use of honeypots provides effective solution to increase the security and reliability of the network. Honeypots are easy to use, capture the required information and mainly used by the corporate companies to secure their networks from the online hackers and unauthorized users.

Article Details

How to Cite
Vishal Bankar, Suvarna Zinjurke, & Akshay A. Somwanshi. (2021). Implementation of Honeypots. JournalNX - A Multidisciplinary Peer Reviewed Journal, 270–273. Retrieved from https://repo.journalnx.com/index.php/nx/article/view/1937