期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:6
出版社:S.S. Mishra
摘要:A honeypot is used in the area of computer and Internet security. It is a resource used to trap attacks, records intrusion information about tools and events of the hacking process, and avoids attacks outbound the compromised computer system. It can also be deployed to attract and divert an attacker from their real targets. The goal of our paper is to show the overview of honeypots and their use in a research as well as productive environment. A honeypot can be anything from Windows to UNIX. Compared to the other intrusion detection systems, honeypots have the big advantage that they do not generate incorrect alerts or large log files like other intrusion detection systems because no productive components are running on the system. Other big advantage of honeypot system is that we don't need to manage the data base of intrusions signature or definition. The honeypot system logs every byte that flows through the network. This log data helps the researcher to draw a picture of an attack and the attacker