Security

An Analysis of Honeypots With Special Reference to Honeyd

Download Now Free registration required

Executive Summary

It's a herculean task for system administrators and normal web users to patch up their computers and keep all the software up to date. And in the case of Zero Day attacks there is very little which he can do to protect his system. One way to get early warnings of new vulnerabilities is to setup monitoring computer system on a network where the authors expect that the tendency of breaking in is high. There are various methods of doing this. One popular way is by using IDS and IPS. But there is another method, which is gradually becoming quite popular in the security domain. This new systems are called Honeypots. Honeypots are systems, which are intentionally, setup to bait hackers and learn their modus operandi.

  • Format: PDF
  • Size: 223.5 KB