Open Access Open Access  Restricted Access Subscription or Fee Access

HONEYPOT: Network Security

A. Dayana, S. Saranya, B. Geethamani, R. Kashturi

Abstract


Network forensics is basically used to detect attacker activity and to analyze their behavior. Data collection is the major task of network forensics and honeypots are used in network forensics to collect useful data. Honeypot is an exciting new technology with enormous potential for security communities. This review paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them. Research Paper also discuss about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network. Furthermore, paper reveals about the different kind of honeypots their level of interaction and risks associated with them.

Full Text:

PDF

References


Spitzner, L. Open Source Honeypots: Learning with honeyd, SecurityFocus, 2003.

Wikipedia. http://en.wikipedia.org/wiki/Honeypot_(computing).

Karthik, S., Samudrala, B. and Yang, A.T. Design of NetworkSecurity Projects Using Honeypots. Journal of Computing Sciencesin Colleges, 2004. Know your enemy Honeynets,http://www.honeynet.org/papers/key.htmlSANS institute GIEC certification GSECAssignments#1.4:Honeypots Stretegic Considerations,2002.

John Carroll, Computer Security, 3rd ed., Butterworth-Heinemann, 1997.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.