A Review Paper on the Survey on Honeypot Technology

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
The information security is an ever increasing concern of organizations and individuals in this age. The information security techniques have started to take different forms from the traditional techniques used in the past as attacks have become more sophisticated. Honeypots are physical or virtual machines successfully used as intrusion detection tools to detect worm-infected hosts. In the area of information security, honeypots refers to a closely monitored computing resource that the authors want to be probed, attacked or compromised. In this paper, they present an overview of intrusion detection systems and a brief discussion on honeypots. The trend towards grouping honeypots into honeynets and Honeyd, HoneyBOT, and Specter honeypots will also be discussed.
Download Now

Find By Topic