首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:Review of Implementing a Working Honeypot System
  • 本地全文:下载
  • 作者:Amandeep Singh ; Satwinder Singh ; Saab Singh
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2013
  • 卷号:3
  • 期号:6
  • 出版社:S.S. Mishra
  • 摘要:A honeypot is used in the area of computer and Internet security. It is a resource used to trap attacks, records intrusion information about tools and events of the hacking process, and avoids attacks outbound the compromised computer system. It can also be deployed to attract and divert an attacker from their real targets. The goal of our paper is to show the overview of honeypots and their use in a research as well as productive environment. A honeypot can be anything from Windows to UNIX. Compared to the other intrusion detection systems, honeypots have the big advantage that they do not generate incorrect alerts or large log files like other intrusion detection systems because no productive components are running on the system. Other big advantage of honeypot system is that we don't need to manage the data base of intrusions signature or definition. The honeypot system logs every byte that flows through the network. This log data helps the researcher to draw a picture of an attack and the attacker
  • 关键词:Intrusion Detection System; Honeypot; Network security
国家哲学社会科学文献中心版权所有