Abstract
Honeypot is a computer security mechanism set to detect, deflect or counteract attempts at unauthorized use of information. It has enormous potential for the security community. This can be modeled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content and is meant to convince the adversary that they have accessed the actual system and encourage them to spend time within this controlled environment. It acts better than firewalls or intrusion detection system by detecting encrypted attacks in IPv6 networks to capture different types of frauds.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal For Innovative Engineering and Management Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.