Analysis on Different Algorithms of Dynamic Honeypots

Download Now
Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
Today's it is obvious that the number of vulnerable threat of network assets increase significantly. The major examples of such threats are worms which can be found in the Internet. In spite of decades of research and experience, still incapable to make secure computer systems and also they immobilized manufacture ways to measure a computer systems and networks level of security. This is certainly true that intrusion to a network or system can never be eliminated but security helps reduce risk to an organization and its information-related resources. However, three particular concepts surrounded the IT security includes detection, prevention and reaction.
Download Now

Find By Topic