Hybrid Solution in Honeypot Mechanism Using Hadoop

Provided by: Creative Commons
Topic: Security
Format: PDF
Achieving computer system security is one of the most popular and fastest information technology in organization. System security personnel fight a seemingly unending battle to secure their digital assets against an ever increasing onslaught of attacks. Protection of information availability, its access and data integrity are the basic security characteristics of information sources. Any disruption of these properties would result in system intrusion and the related security risk. Advanced decoy based technology called honeypot has a huge potential for the security community and can achieve several goals of other security technologies, which makes it almost universal.

Find By Topic