Thursday, 20 Feb, 2020




Efficient Security Services of Honeypot using Kerberos for Detecting Intruders

Journal of Network and Information Security

Volume 3 Issue 2

Published: 2015
Author(s) Name: Dinesh S. Kapse, Vijay Bagdi | Author(s) Affiliation: Dept. of Wireless Communication & Computing, A. G. P. C. O. E, Nagpur, Maharashtra, India
Locked Subscribed Available for All


Internet security is a vital issue of recent times. It is necessary to protect our assets or valuable data from unauthorised person. There area number of techniques available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victims site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not give the vital information to the unauthorised person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker. In this paper the brief introduction of honeypots and the types and its uses are described. This paper would also give introduction about Kerberos. Finally we shall conclude by looking at the future of honeypot using Kerberos.

Keywords: Internet Security, Unauthorised Person, Honeypot, Attacker, Kerberos

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback ©, All rights reserved