Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/11984
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhanpara, Prashant-
dc.date.accessioned2023-08-24T08:55:59Z-
dc.date.available2023-08-24T08:55:59Z-
dc.date.issued2023-06-01-
dc.identifier.urihttp://10.1.7.192:80/jspui/handle/123456789/11984-
dc.description.abstractThis article presents Honeypot, a novel network security mechanism. The basics of honeypots, their use in modern computer networks, including their employment in educational settings are all covered in this study. The different types of honeypots are described, like the Production honeypot, Research honeypot. The benefits and drawbacks of honeypots are further examined. Future research in the field of honeypots, including possible improvements to the framework, is considered. Globalization is becoming increasingly vital. At the same time, cybercrime is on the rise. Countermeasures are created to identify or prevent assaults; most of these countermeasures are based on known facts and attack patterns. Countermeasures and vulnerabilities can be enhanced by understanding attack techniques. For such objectives, a honeypot is used. It is a resource that is meant to be attacked and digitized in order to learn more about the attacker and employed tools. Honeypots are closely watched decoys used in a network to analyze the path of hackers and inform network administrators of a potential breach. In this article, we give an overview of honeypots and a starting point for anyone interested in this technology.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries21MCEI18;-
dc.subjectComputer 2021en_US
dc.subjectProject Report 2021en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject21MCEen_US
dc.subject21MCEI18en_US
dc.subjectINSen_US
dc.subjectINS 2021en_US
dc.subjectCE (INS)en_US
dc.titlePSLVE: Honeypot A Way To Capture Attackersen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
21MCEI18.pdf21MCEI182.2 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.