International Journal of Scientific Research in Network Security and Communication

  • Year: 2018
  • Volume: 6
  • Issue: 2

Honeypots: Virtual Network Intrusion Monitoring System

  • Author:
  • Manmohan Dagar1,, Rashmi Popli2
  • Total Page Count: 5
  • DOI:
  • Page Number: 45 to 49

1Department of Computer Networking, YMCA University of Science and Technology, Faridabad, India

2Department of Computer Networking &Information Technology, YMCA University of Science and Technology, Faridabad, India

Abstract

In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider and the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your information. This paper discusses how honeypot technologies can be used to detect, identify, and gather information on these specific threats.

Keywords

Honeypot, Intrusion Detection System (IDS), Honeyd, Load Balancer, Honeycomb and Honeywall