Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/11984
Title: PSLVE: Honeypot A Way To Capture Attackers
Authors: Khanpara, Prashant
Keywords: Computer 2021
Project Report 2021
Computer Project Report
Project Report
21MCE
21MCEI18
INS
INS 2021
CE (INS)
Issue Date: 1-Jun-2023
Publisher: Institute of Technology
Series/Report no.: 21MCEI18;
Abstract: This article presents Honeypot, a novel network security mechanism. The basics of honeypots, their use in modern computer networks, including their employment in educational settings are all covered in this study. The different types of honeypots are described, like the Production honeypot, Research honeypot. The benefits and drawbacks of honeypots are further examined. Future research in the field of honeypots, including possible improvements to the framework, is considered. Globalization is becoming increasingly vital. At the same time, cybercrime is on the rise. Countermeasures are created to identify or prevent assaults; most of these countermeasures are based on known facts and attack patterns. Countermeasures and vulnerabilities can be enhanced by understanding attack techniques. For such objectives, a honeypot is used. It is a resource that is meant to be attacked and digitized in order to learn more about the attacker and employed tools. Honeypots are closely watched decoys used in a network to analyze the path of hackers and inform network administrators of a potential breach. In this article, we give an overview of honeypots and a starting point for anyone interested in this technology.
URI: http://10.1.7.192:80/jspui/handle/123456789/11984
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
21MCEI18.pdf21MCEI182.2 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.