Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

A STUDY ON HONEYPOT SYSTEM FOR WEB BASED NETWORK

Author(s):

Deepali Jawale

Keywords:

Honeypot, IDS(intrusion detection system)

Abstract

Honeypots are a new approach for network security. A honeypot is a computer security mechanism set to detect, deflect, and tract t attempts at unauthorized use of information systems. A honeypot is used in the area of internet security and cryptography. This we can use to find attacks that are attempting on the network. It will divert the attacker from the location so that the attacker cannot get actual data. It can used in IDS because it will not generate an false alarm because no productive components are running on the system.. This paper would first give a brief introduction to honeypots the types and its uses. This paper will give the brief detail about what is honey pot its type and the structure and component of honeypot.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 11
Publication Date: 11/4/2016

Article Preview




Download Article