Author:
Akshay Akshat Divya,Bhushan Anchit,Anand Nihal,Khemka Rishabh,Devi K.A Sumithra
Abstract
The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that is a framework trap that is set to act against unapproved utilization of PCs and data frameworks. Around the globe, a huge number of individuals get to the web each day, honeypot which can likewise be called Intrusion Detection Technology is another time of security innovation that screens device to avoid malicious sports. The whole factor of this research paper is an Intrusion Detection System and Intrusion Prevention System, elements accomplished via honeypot and honeytrap methodologies. A great deal of research went into this review paper and the discoveries propose that the honeypots are drawing in light of a legitimate concern for analysts as a significant security system that can be actualized to stop or occupy the assaults the system assaults and give a chance to find out increasingly more about the source and nature of these assaults. Hence we can say that a honeypot can be utilized as an examination apparatus to accumulate increasingly more data about the expanding number of system assaults that are going on consistently.
Publisher
Lamintang Education and Training Centre
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Analysis of Exploring SDN-Enabled Honeypots for IoT Security;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01
2. Detection of Cyber-attacks using Deep Convolution in Honeyed Framework;2023 International Conference on Disruptive Technologies (ICDT);2023-05-11
3. Using rootkits hiding techniques to conceal honeypot functionality;Journal of Network and Computer Applications;2023-05
4. WEB Security Protection Technology Based on Honeypot Technology;2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS);2022-12-11