Information precautions using intellectual honeypot instrument

Authors

  • Arul L Selvakumar Director-CA, T.John College, Bangalore, India
  • K. Lecturer T.John College, Bangalore, India

Keywords:

AODV, Blackhole, Honeypot, Intrution Detection, Honeynets

Abstract

A honeypot is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as all traffic is suspicious, because no productive components are running on the system. Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defence to supplement the existing methods. One of these methods involves the use of honeypots. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In this paper, examine types of Honeypots, detection scheme, advantages and disadvantages of honeypots and generations of honeynets.

References

Honeynet Project, 2001. “Know Your Enemy: Learning about Security Threats”, 2nd Edition Addison Wesley Press.

Karthik, S., Samudrala, B., Yang, A.T., 2009. Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges, 20, (4).

Know Your Enemy, 2003. Passive Honeynets. Honeynet Project. 18 January, 2003. http://project.honeynet.org/

Li-juan, Z., 2009. “Honeypot-based Defence System Research and Design”, IEEE.

Pirzada, A.A., 2005. McDonald, C.,” Secure Routing with the AODV Protocol”, 2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3 - 5 October.

Prathapani, A., 2009. Lakshmi and Dharma P.Agrawal : “Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks”, IEEE.

Published

2012-12-28

How to Cite

L Selvakumar, A. ., & Lecturer, K. . (2012). Information precautions using intellectual honeypot instrument. Scientific Journal of Pure and Applied Sciences, 1(3), 84-89. Retrieved from http://sjournals.com/index.php/sjpas/article/view/1023

Issue

Section

Computer and Information Science