Abstract

Honeypot is a computer security mechanism set to detect, deflect or counteract attempts at unauthorized use of information. It has enormous potential for the security community. This can be modeled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content and is meant to convince the adversary that they have accessed the actual system and encourage them to spend time within this controlled environment. It acts better than firewalls or intrusion detection system by detecting encrypted attacks in IPv6 networks to capture different types of frauds.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.