Honeypots and Network Security

Description: The research paper Honeypots and Network Security talks about Honeypots as an essential breakthrough in the domain of network security. Honeypots as the name suggests are an exciting innovation. Honeypots belong to the domain of Network Security and Internet services. Honeypots are something that turn the tables against black hats. The research paper suggests that we are living in an age where communication through internet is the order of the day. There is hardly any information that is not found on the internet.

 Honeypots help computer scientists and computer forensics’ experts to create a fake program that looks similar to the vulnerable program in order to lure the hacker into a trap. Once the cyber criminal is caught subsequent legal proceeding are unleashed against him and on the other hand, security systems are made more powerful and resistant against attacks like these.  It is suggested in the research paper that honey pots can trap a cyber criminal, at the same time Honeypots may require lot of additional maintenance and other things which are beyond comfort level. Honeypot in itself is an important data that would certainly trigger the criminal’s interest. It is all about the company’s willingness to hold some information at stake. A honeypot is a fake resource and can be exploited or compromised. But once the attack is in progress the cyber scientists can analyse the pathway the criminal opts.

The high end honeypot has a deeper underlying operation. This involves a much higher risk as the complexity improves rapidly. A honeypot is easy to install and operate and it can be along with the server. The disadvantage of placing a honeypot in front of a firewall is that it cannot trap the internal culprit.

Conclusion: The research paper concludes on a note saying that honeypots are effective in understanding the pathway adopted by the cybercriminal.

Download Honeypots and Network Security technical Paper Presentation.

Leave a Reply

Your email address will not be published. Required fields are marked *