Abstract

Honeypot is a computer security mechanism set to detect, deflect or counteract attempts at unauthorized use of information. It has enormous potential for the security community. This can be modeled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content and is meant to convince the adversary that they have accessed the actual system and encourage them to spend time within this controlled environment. It acts better than firewalls or intrusion detection system by detecting encrypted attacks in IPv6 networks to capture different types of frauds.

Keywords:
Honeypot Computer security Intrusion detection system Computer science Asset (computer security) Adversary Host-based intrusion detection system Server Encryption Network security Set (abstract data type) Intrusion prevention system Computer network

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
5
Refs
0.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

HONEYPOT: Intrusion Detection System

Akshat Divya AkshayAnchit BhushanNihal AnandRishabh KhemkaSumithra Devi K.A

Journal:   International Journal of Education Science Technology and Engineering (IJESTE) Year: 2020 Vol: 3 (1)Pages: 13-18
JOURNAL ARTICLE

Honeypot based Intrusion Detection System for Cyber Physical System

G.Kingsle EdwinVinodh EwardsG. Jaspher W. KathrineG. Matthew PalmerA. BertiaS.J. Vijay

Journal:   2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS) Year: 2022 Pages: 958-962
© 2026 ScienceGate Book Chapters — All rights reserved.