Network security using honeypot

Sahraie Kalejahi, Masumeh Network security using honeypot. Nama, 2005, vol. 5, n. 2. [Journal article (Unpaginated)]

[thumbnail of kalejahi.pdf]
Preview
PDF
kalejahi.pdf

Download (176kB) | Preview

English abstract

We always hear news about hacker's being arrested or a group of internet saboteurs discovered. Hacking techniques have improved to the point that little or no traces of unauthorized access is left. Computer security experts often use a tool called honeypot to entrap intruders. The present paper outlines honeypot techniques, its variants and various technologies applied to this effect.

Item type: Journal article (Unpaginated)
Keywords: Hackers, Computer security, Intruder detection entrapment
Subjects: L. Information technology and library technology > LH. Computer and network security.
Depositing user: Mahmoud Babaie
Date deposited: 23 Oct 2006
Last modified: 02 Oct 2014 12:04
URI: http://hdl.handle.net/10760/8262

References

http://www.sgnec.net

http://www.websecurity.ir

http://www.persiantools.com


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item