Bushra TaherNida ArshadY Sai PragathiK ChenS ZhangZ LiYi ZhangQ DengSandip RayJin YierW ZhouY JiaA PengY ZhangP LiuJ LinW YuN ZhangX YangH ZhangW ZhaoT HastieR TibshiraniJ FriedmanC KoliasG KambourakisA StavrouJ VoasJ DoughertyR KohaviM SahamiR SommerV PaxsonM AnirudhS Thileeban AndD NallathambiK RieckT HolzC WillemsP DsselP Laskov
Honeypot is a computer security mechanism set to detect, deflect or counteract attempts at unauthorized use of information. It has enormous potential for the security community. This can be modeled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content and is meant to convince the adversary that they have accessed the actual system and encourage them to spend time within this controlled environment. It acts better than firewalls or intrusion detection system by detecting encrypted attacks in IPv6 networks to capture different types of frauds.
Akshat Divya AkshayAnchit BhushanNihal AnandRishabh KhemkaSumithra Devi K.A
G.Kingsle EdwinVinodh EwardsG. Jaspher W. KathrineG. Matthew PalmerA. BertiaS.J. Vijay
Surabhi R, Surya Prakash Garlapati, Tanisha Srivastava, Prof. Anitha Sandeep, Dr. Pavithra H