Honeypot : Decoy Server or System Setup Together Information Regarding an Attacker

Download Now
Provided by: VSRD International Journals
Topic: Security
Format: PDF
In this paper, the authors describe a highly flexible security system for incorrect or anomalous activity. Today attacker or intruder to the user's system is the biggest problem for the safety of the network. Honeypot systems are decoy server or system setup together information regarding an attacker or intruder into their system. As already there are other methods for detecting inappropriate or anomalous activities but they have several limitations of anomaly detections such as high rate of false alarm, alerts generated does not contain sufficient detailed information for forensic analysis and hence hinder the development of counter-measures etc.
Download Now

Find By Topic