Open Access Open Access  Restricted Access Subscription Access

Honeypot for Organization Security: A Presentation Investigation

Saniya Shaikh

Abstract


Correspondences over the Web are under serious dangers as assaults are expanding a large number of days. Network legal sciences are the course of examination such goes after through breaking down network information and occasions. Many provokes are confronting specialists because of the quick developing of organization scale and gatecrashers' abilities. Honeypots are PC traps that are intended to be compromised to draw in programmers and screen their systems and apparatuses. Utilizing honeypots gives a practical answer for increment the security of an association. Observing vindictive traffic is valuable for network crime scene investigation and interruption recognition frameworks. This paper zeroed in on concentrating on network strategies and instruments as well as fostering a well comprehension of honeypots wordings and their worth in network criminology. Assaults on the web continue to increment and it really hurts our security framework. To limit this danger, it is important to have a security framework that can recognize zero-day assaults and block them. "Honeypot is the proactive safeguard innovation, where assets set in an organization with the mean to notice and catch new assaults". This paper proposes a honeypot-based model for interruption location framework (IDS) to get the best helpful information about the aggressor. Honeypot devices contrast in a few perspectives examined here in an objective examination. In addition, Honeypots effectiveness is assessed versus network interruption identification and anticipation framework (IDPS). That uses different honeypots to bamboozle assailants and break down their pernicious ways of behaving


Full Text:

PDF

References


Yang, Y., Yang, H., & Mi, J. (2011, May). Design of distributed honeypot system based on intrusion tracking. In 2011 IEEE 3rd International Conference on Communication Software and Networks (pp. 196-198). IEEE.

Nasir, Q., & Al-Mousa, Z. A. (2013). Honeypots Aiding Network Forensics: Challenges and Notions. J. Commun., 8(11), 700-707.

Jain, Y. K., & Singh, S. (2011). Honeypot based secure network system. International Journal on Computer Science and Engineering, 3(2), 612-620.

Mrdović, S., & Zajko, E. (2005). Secured intrusion detection system infrastructure.

Kondra, J. R., Bharti, S. K., Mishra, S. K., & Babu, K. S. (2016, March). Honeypot-based intrusion detection system: A performance analysis. In 2016 3rd international conference on computing for sustainable global development (INDIACom) (pp. 2347-2351). IEEE.


Refbacks

  • There are currently no refbacks.