IJSRP, Volume 3, Issue 8, August 2013 Edition [ISSN 2250-3153]
Srivathsa S Rao, Vinay Hegde, Boruthalupula Maneesh, Jyothi Prasad N M, Suhas Suresh
Abstract:
Honeypots are a modern approach to network security. A honeypot is used in the area of internet security and cryptography. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used implementations. It can be deployed to attract and divert an attacker from their real targets. Honeypots have the big advantage that they do not generate false alerts as each observed traffic is doubtful, because no productive components are running on the system. This fact enables the system to log every byte that flows through the network through and from the honeypot, and to relate this data with other sources to draw a picture of an attack and the attacker.