High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Review on Securing a Private Network using Honeypot

Author(s):

Shikha Malakar , school of computer science and IT, DAVV indore

Keywords:

Firewall, Honeypot, IDS, IPS, Security, Vulnerability

Abstract

Technology is being advanced day by day, more and more people are using internet all over the world. It is becoming a part of everyone’s life. However, how many people are concerned about security? As technology is growing rapidly, newer attacks are appearing. The problem of security becomes even more critical in academic environment. The main aim of this research is to identify how Honeypot can be used in an academic environment to make it secure. Honeypot is a well-designed tool that is used to identify hackers. By using Honeypot, it is possible to monitor the activities started and running on the system by hacker. In other words, Honeypot is a trap machine which looks like a real machine and can be used to find out threats of a system. It is great way to improve security by getting the information from a victim system using forensic tool.

Other Details

Paper ID: IJSRDV4I31404
Published in: Volume : 4, Issue : 3
Publication Date: 01/06/2016
Page(s): 1736-1738

Article Preview

Download Article