Information precautions using intellectual honeypot instrument

سال انتشار: 1391
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 389

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_SJPAS-1-3_009

تاریخ نمایه سازی: 15 آذر 1394

چکیده مقاله:

A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. Thishas led to growing interest in more aggressive forms of defence tosupplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.

نویسندگان

L.S Arul

Director-CA, T.John College, Bangalore, India.

k Lecturer

T.John College, Bangalore, India.