Academic Journals Database
Disseminating quality controlled scientific knowledge

Information precautions using intellectual honeypot instrument

Author(s): Arul L Selvakumar | K. Lecturer

Journal: Scientific Journal of Pure and Applied Sciences
ISSN 2322-2956

Volume: 1;
Issue: 3;
Start page: 84;
Date: 2013;
Original page

Keywords: AODV | Blackhole | Honeypot | Intrution Detection | Honeynets

A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defence to supplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.

Tango Jona
Tangokurs Rapperswil-Jona

RPA Switzerland

Robotic Process Automation Switzerland