Honeypot Technique Used for Intrusion Detection System

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Deception systems using Honeypot presents a system that pretends to have alone or more network vulnerabilities that a blackhat or a hacker is looking for. But actually it does not have those vulnerabilities. It does so just to deceive the intruder. And it does so by stealthily monitoring the network, as an example assume an application which acts to serve on some well known port and logs all the attackers proceedings, this way Honeypot deceive the intruders at the same time manages to record some very valuable information.
Download Now

Find By Topic