Abstract

PC Networks and Internet has become acclaimed these days since it fulfills individuals with varying needs by giving assortment of perfect service. Computer Networks have reformed our utilization of PC. Debits, Purchasing from e-commerce and many other needful activities performed by a single click from our homes. In spite of the fact that it is an aid right now, likewise has its own dangers what's more, shortcomings as well. Enterprises need to tussle to give security to their systems and in reality not conceivable to offer a cent percent security because of the immaterial knowledge of hackers meddling into the network. This paper gives the idea of honeypots for securing the network of the different organizations which might not have custom intrusion detection system or firewalls. The proposed model shows the different techniques utilized by hackers and makes a log of all hackers exercises. Hence utilizing this log, the network can be kept from assailants.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.