A Proactive Network Security Technology for Managing It Infrastructure Using Honeynets

Exploring the Advancements and Applications of Honeypot Technology in Network Security

Authors

  • Saurabh Kawatra
  • Dr. Raghav Mehra

Keywords:

Proactive Network Security Technology, Managing IT Infrastructure, Honeynets, Advances in Honeypot, Recommendations, Investigation, Training, Hybrid environment, IDS, Mark system, Action Analysis

Abstract

In this paper we survey the ongoing advances in honeypot. A few striking recommendations and there investigation have been talked about. The parts of utilizing honeypot in training and in half and half condition with IDS have been clarified. In this paper we likewise characterize the utilization of mark system in honeypot for activity investigation. In the end we condenses every one of these viewpoints.

Downloads

Published

2018-11-01

How to Cite

[1]
“A Proactive Network Security Technology for Managing It Infrastructure Using Honeynets: Exploring the Advancements and Applications of Honeypot Technology in Network Security”, JASRAE, vol. 15, no. 11, pp. 408–416, Nov. 2018, Accessed: Jul. 08, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/9078

How to Cite

[1]
“A Proactive Network Security Technology for Managing It Infrastructure Using Honeynets: Exploring the Advancements and Applications of Honeypot Technology in Network Security”, JASRAE, vol. 15, no. 11, pp. 408–416, Nov. 2018, Accessed: Jul. 08, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/9078