2020
DOI: 10.36079/lamintang.ijeste-0301.66
|View full text |Cite
|
Sign up to set email alerts
|

HONEYPOT: Intrusion Detection System

Abstract: The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that is a framework trap that is set to act against unapproved utilization of PCs and data frameworks. Around the globe, a huge number of individuals get to the web each day, honeypot which can likewise be called Intrusion Detection Technology is another time of sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
1
0
Order By: Relevance
“…In the realm of cybersecurity, a honeypot serves as a mechanism to discover, divert, or counter any unauthorized exploitation of information systems. A honeypot is essentially a decoy system that is designed to attract and trap potential attackers by imitating a vulnerable system or application [9][10][11]. The global average cost of a Data breach is about 4.35 USD.…”
Section: Introductionmentioning
confidence: 99%
“…In the realm of cybersecurity, a honeypot serves as a mechanism to discover, divert, or counter any unauthorized exploitation of information systems. A honeypot is essentially a decoy system that is designed to attract and trap potential attackers by imitating a vulnerable system or application [9][10][11]. The global average cost of a Data breach is about 4.35 USD.…”
Section: Introductionmentioning
confidence: 99%
“…A honeypot is a cybersecurity prevention tool that is compromised and located in a critical network area to gather data about potential attackers [9]. Honeypots are a new technology with significant potential for network security.…”
Section: Introductionmentioning
confidence: 99%