Advanced Honeypot Architecture for Network Threats Quantification

Download Now
Provided by: International Journal of Scientific Engineering and Applied Science (IJSEAS)
Topic: Networking
Format: PDF
Today's world is increasingly relying on computer networks. The increase in the use of network resources is followed by a rising volume of security problems. New threats and vulnerabilities are discovered every day and affect users and companies at critical levels, from privacy issues to financial losses. Monitoring network activity is a mandatory step for researchers and security analysts to understand these threats and to build better protections. Honeypots were introduced to monitor unused IP spaces to learn about attackers. The advantage of honeypots over other monitoring solutions is to collect only suspicious activity.
Download Now

Find By Topic