Ensuring the network security using IDS & honeypots

  • s A
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The primary focus of this paper is to manifest about the rousing trends to ensure the network security.byusing network security tools such as honeypots and ids(intrusion detection system) .Honey pots can be called as a software or computer or a file that induces the hacker or the hostile computer activities to commit computer crimes or illegal activities which the hacker feels is concealed but it is being monitored through honey pot.It is basically a defense mechanism.Only the hackers will be caught and the other normal people are not allowed or prevented to connect to it.whereas, an IDS(Intrusion Detection System) is an detection module or a tool used to detect malicious activities.

Cite

CITATION STYLE

APA

s, Ayushi. (2019). Ensuring the network security using IDS & honeypots. International Journal of Research in Advent Technology, 7(2), 39–45. https://doi.org/10.32622/ijrat.72201905

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free