Efficient Security Services of Honeypot using Kerberos for Detecting Intruders
Published: 2015
Author(s) Name: Dinesh S. Kapse, Vijay Bagdi |
Author(s) Affiliation: Dept. of Wireless Communication & Computing, A. G. P. C. O. E, Nagpur, Maharashtra, India
Locked
Subscribed
Available for All
Abstract
Internet security is a vital issue of recent times. It is necessary to protect our assets or valuable data from unauthorised person. There area number of techniques available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victims site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not give the vital information to the unauthorised person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker. In this paper the brief introduction of honeypots and the types
and its uses are described. This paper would also give introduction about Kerberos. Finally we shall conclude by looking at the future of honeypot using Kerberos.
Keywords: Internet Security, Unauthorised Person, Honeypot, Attacker, Kerberos
View PDF