Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/11984
Title: | PSLVE: Honeypot A Way To Capture Attackers |
Authors: | Khanpara, Prashant |
Keywords: | Computer 2021 Project Report 2021 Computer Project Report Project Report 21MCE 21MCEI18 INS INS 2021 CE (INS) |
Issue Date: | 1-Jun-2023 |
Publisher: | Institute of Technology |
Series/Report no.: | 21MCEI18; |
Abstract: | This article presents Honeypot, a novel network security mechanism. The basics of honeypots, their use in modern computer networks, including their employment in educational settings are all covered in this study. The different types of honeypots are described, like the Production honeypot, Research honeypot. The benefits and drawbacks of honeypots are further examined. Future research in the field of honeypots, including possible improvements to the framework, is considered. Globalization is becoming increasingly vital. At the same time, cybercrime is on the rise. Countermeasures are created to identify or prevent assaults; most of these countermeasures are based on known facts and attack patterns. Countermeasures and vulnerabilities can be enhanced by understanding attack techniques. For such objectives, a honeypot is used. It is a resource that is meant to be attacked and digitized in order to learn more about the attacker and employed tools. Honeypots are closely watched decoys used in a network to analyze the path of hackers and inform network administrators of a potential breach. In this article, we give an overview of honeypots and a starting point for anyone interested in this technology. |
URI: | http://10.1.7.192:80/jspui/handle/123456789/11984 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
21MCEI18.pdf | 21MCEI18 | 2.2 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.