International Association of Engineering and Management Education (IAEME)
The primary goal of computer security is to defend computers against attacks launched by malicious users. There are a number of ways in which researchers and developers can work to protect the network they use; one class of these tools are honeypots. A honeypot is a computer which has been configured to some extent to seem normal to an attacker, but actually logs and observes what the attacker does. Here in this paper, the author presenting the integrated honeypot that can generate attack signatures against the zero day attack, SSH attack, Keylogger-spyware attack.