Review of Implementing a Working Honeypot System

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
A honeypot is used in the area of computer and Internet security. It is a resource used to trap attacks, records intrusion information about tools and events of the hacking process, and avoids attacks outbound the compromised computer system. It can also be deployed to attract and divert an attacker from their real targets. This paper is to show the overview of honeypots and their use in a research as well as productive environment. A honeypot can be anything from Windows to UNIX. Compared to the other intrusion detection systems, honeypots have the big advantage that they do not generate incorrect alerts or large log files like other intrusion detection systems because no productive components are running on the system.

Find By Topic