Protection Method Against Unauthorised Issues In Network-Honeypots
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - April Issue 2013 by IJCTT Journal|
|Volume-4 Issue-4 |
|Year of Publication : 2013|
|Authors : K.Meenakshi, M.Nalini Sri|
K.Meenakshi, M.Nalini Sri "Protection Method Against Unauthorised Issues In Network-Honeypots"International Journal of Computer Trends and Technology (IJCTT),V4(4):651-659 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -From common man to huge organization everyone uses network daily for data transfer or for business purpose based on their requirement.But there is no full security to the services provided by the internet. So everyone has to follow some measures to prevent themselves from security attacks by adopting some security measures.Some of them are firewalls ,antivirus software, authorization of accesing methods,detection of threats methodology etc.. Honey pots is one of the method to prevent threats and intrusions during network accessing during the daily use of internet. This method will not give full protection to the network but can reduce the loss due to insecurity in the network. This paper brings awareness about threats in the network and the prevention of it by using a method HONEYPOTS. By adopting this measures the problems arising in the network will be reduced and one day we can use the fully secured network as for every problem there will be a solution.
Keywords — honeypots,spammers,honeynets,low-interaction honeypots:honeyd.