Author(s): Arul L Selvakumar | K. Lecturer
Journal: Scientific Journal of Pure and Applied Sciences
ISSN 2322-2956
Volume: 1;
Issue: 3;
Start page: 84;
Date: 2013;
Original page
Keywords: AODV | Blackhole | Honeypot | Intrution Detection | Honeynets
ABSTRACT
A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defence to supplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.
Journal: Scientific Journal of Pure and Applied Sciences
ISSN 2322-2956
Volume: 1;
Issue: 3;
Start page: 84;
Date: 2013;
Original page
Keywords: AODV | Blackhole | Honeypot | Intrution Detection | Honeynets
ABSTRACT
A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defence to supplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.