Network Protection using Honeypots

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

PC Networks and Internet has become acclaimed these days since it fulfills individuals with varying needs by giving assortment of perfect service. Computer Networks have reformed our utilization of PC. Debits, Purchasing from e-commerce and many other needful activities performed by a single click from our homes. In spite of the fact that it is an aid right now, likewise has its own dangers what's more, shortcomings as well. Enterprises need to tussle to give security to their systems and in reality not conceivable to offer a cent percent security because of the immaterial knowledge of hackers meddling into the network. This paper gives the idea of honeypots for securing the network of the different organizations which might not have custom intrusion detection system or firewalls. The proposed model shows the different techniques utilized by hackers and makes a log of all hackers exercises. Hence utilizing this log, the network can be kept from assailants.

Cite

CITATION STYLE

APA

Rajesh*, D., Srivastav, B., & Hussan, Dr. M. I. T. (2020). Network Protection using Honeypots. International Journal of Innovative Technology and Exploring Engineering, 9(6), 1911–1916. https://doi.org/10.35940/ijitee.f3863.049620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free